<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-ucl-acl-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="A Policy-based Network Access Control">A YANG Data Model and RADIUS Extension for Policy-based Network Access Control</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-ucl-acl-09"/>
    <author fullname="Qiufang Ma" role="editor">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Jiangsu</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <author fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Jiangsu</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair" role="editor">
      <organization>Orange</organization>
      <address>
        <postal>
          <city>Rennes</city>
          <code>35000</code>
          <country>France</country>
        </postal>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Daniel King">
      <organization>Lancaster University</organization>
      <address>
        <postal>
          <country>United Kingdom</country>
        </postal>
        <email>d.king@lancaster.ac.uk</email>
      </address>
    </author>
    <date year="2025" month="October" day="07"/>
    <area>Operations and Management</area>
    <workgroup>OPSAWG</workgroup>
    <keyword>ACL</keyword>
    <keyword>Policy-based</keyword>
    <keyword>BYOD</keyword>
    <keyword>Access control</keyword>
    <abstract>
      <?line 64?>

<t>This document defines a YANG data model for policy-based network access
   control, which provides consistent and efficient enforcement of
   network access control policies based on group identity.  Moreover, this document defines a mechanism to ease the maintenance
   of the mapping between a user group identifier and a set of IP/MAC addresses
   to enforce policy-based network access control.</t>
      <t>In addition, the document defines a Remote Authentication Dial-in
   User Service (RADIUS) attribute that is used to
   communicate the user group identifier as part of identification and
   authorization information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Operations and Management Area Working Group Working Group mailing list (opsawg@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/policy-based-network-acl"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="intro">
      <name>Introduction</name>
      <t>With the increased adoption of remote access technologies (e.g.,
   Virtual Private Networks (VPNs)) and Bring Your Own Device (BYOD)
   policies, enterprises adopted more flexibility related to how, where,
   and when employees work and collaborate.  However, more flexibility
   comes with increased risks.  Enabling office flexibility (e.g.,
   mobility across many access locations) introduces a set of challenges
   for large-scale enterprises compared to conventional network access management approaches.
   Examples of such challenges are listed below:</t>
      <ul spacing="normal">
        <li>
          <t>Endpoints do not have stable IP addresses.  For example, Wireless
LAN (WLAN) and VPN clients, as well as back-end Virtual Machine
(VM)-based servers, can move; their IP addresses could change as a
result.  This means that relying on IP/transport fields (e.g., the
5-tuple) is inadequate to ensure consistent and efficient security
policy enforcement.  IP address-based policies may not be flexible
enough to accommodate endpoints with volatile IP addresses.</t>
        </li>
        <li>
          <t>With the massive adoption of teleworking, there is a need to
apply different security policies to the same set of users under
different circumstances (e.g., prevent relaying attacks against a
local attachment point to the enterprise network).  For example,
network access might be granted based upon criteria such as users'
access location, source network reputation, users' role, time-of-
day, type of network device used (e.g., corporate issued device
versus personal device), device's security posture, etc. This
means that the network needs to recognize the users' identity and their
current context, and map the users to their correct access
grant to the network.</t>
        </li>
      </ul>
      <t>This document defines a YANG data model (<xref target="sec-UCL"/>) for policy-based network access control,
   which extends the IETF Access Control Lists (ACLs) module defined in <xref target="RFC8519"/>.
   This module can be used to ensure consistent enforcement of ACL policies
   based on the group identity.</t>
      <t>The ACL concept has been generalized to be device-nonspecific, and can be
   defined at network/administrative domain level <xref target="I-D.ietf-netmod-acl-extensions"/>. To
   allow for all applications of ACLs, the YANG module for policy-based network
   ACL defined in <xref target="sec-UCL"/> does not limit how it can be used.</t>
      <t>This document also defines a mechanism to establish a mapping between (1) the
   user group identifier (ID) and (2) common IP packet header fields and other
   encapsulating packet data (e.g., MAC address) to execute the policy-based access control.</t>
      <t>Additionally, the document defines a Remote Authentication Dial-in
   User Service (RADIUS) <xref target="RFC2865"/> attribute that is used to
   communicate the user group identifier as part of identification and
   authorization information (<xref target="sec-radius"/>).</t>
      <t>Although the document cites MAC addresses as an example in some sections, the
   document does not make assumptions about which identifiers are used to trigger ACLs.
   These examples should not be considered as recommendations. Readers should be
   aware that MAC-based ACLs can be bypassed by flushing out the MAC address.
   Other implications related to the change of MAC addresses are discussed in
   <xref target="RFC9797"/>.</t>
      <t>The document does not specify how to map the policy group identifiers
   to dedicated fields (e.g.,  Group Based Policy (GBP) discussed in <xref section="6.2.3" sectionFormat="of" target="RFC9638"/>).</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized
   values at the time of publication.  This note summarizes all of the
   substitutions that are needed.  No other RFC Editor instructions are specified
   elsewhere in this document.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this document</t>
          </li>
          <li>
            <t>SSSS --&gt; the assigned RFC number for <xref target="I-D.ietf-netmod-schedule-yang"/></t>
          </li>
          <li>
            <t>2025-03-11 --&gt; the actual date of the publication of this document</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The meanings of the symbols in tree diagrams are defined in
   <xref target="RFC8340"/>.</t>
      <t>The document uses the following definition in <xref target="RFC3198"/>:</t>
      <ul spacing="normal">
        <li>
          <t>policy</t>
        </li>
      </ul>
      <t>The document uses the following definitions and acronyms defined in <xref target="RFC8519"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Access Control Entry (ACE)</t>
        </li>
        <li>
          <t>Access Control List (ACL)</t>
        </li>
      </ul>
      <t>The following definitions and acronyms are used throughout this document:</t>
      <ul spacing="normal">
        <li>
          <dl>
            <dt>User group based Control List (UCL) model:</dt>
            <dd>
              <t>A YANG data model for policy-based network access
control that specifies an extension to the "ietf-access-control-list" model <xref target="RFC8519"/>.
It allows policy enforcement based on the group identity, which can be used
both at the network device level and at the network/administrative domain level.</t>
            </dd>
          </dl>
        </li>
        <li>
          <dl>
            <dt>Endpoint:</dt>
            <dd>
              <t>refers to an end-user, host device, or application that actually connects to a network.
An end-user is defined as a person. A host device provides compute, memory,
storage and networking capabilities and connects to the network without any user intervention. Host devices refer to servers, IoTs and other devices owned
by the enterprise. An application is a software program used for a specific service.</t>
            </dd>
          </dl>
        </li>
      </ul>
    </section>
    <section anchor="sample-usage">
      <name>Sample Usage</name>
      <t>Access to some networks (e.g., enterprise networks) requires to
   recognize the users' identities no matter how, where, and when they
   connect to the network resources.  Then, the network maps the
   (connecting) users to their access authorization rights.  Such rights
   are defined following local policies.  As discussed in <xref target="intro"/>,
   because (1) there is a large number of users and (2) a user may have different
   source IP addresses in different network segments,
   deploying a network access control policy for each IP address or
   network segment is a heavy workload.  An alternate approach is to
   configure endpoint groups to classify users and enterprise devices
   and associate ACLs with endpoint groups so that endpoints in each
   group can share a group of ACL rules.  This approach greatly reduces
   the workload of the administrators and optimizes the ACL resources.</t>
      <t>The network ACLs can be provisioned on devices using specific
   mechanisms, such as <xref target="RFC8519"/> or <xref target="I-D.ietf-netmod-acl-extensions"/>.</t>
      <t>Different policies may need to be applied in different contextual situations.
   For example, companies may restrict (or grant) employees access to specific
   internal or external resources during work hours,
   while another policy is adopted during off-hours and weekends.  A
   network administrator may also require to enforce traffic shaping
   (<xref section="2.3.3.3" sectionFormat="of" target="RFC2475"/>) and policing
   (<xref section="2.3.3.4" sectionFormat="of" target="RFC2475"/>) during peak hours in order not to affect other data
   services.</t>
    </section>
    <section anchor="policy-based-network-access-control">
      <name>Policy-based Network Access Control</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>An architecture example of a system that provides real-time and consistent
   enforcement of access control policies is shown in <xref target="arch"/>. This architecture
   includes the following functional entities and interfaces:</t>
        <ul spacing="normal">
          <li>
            <t>A service orchestrator which coordinates the overall service,
including security policies.  The service may be connectivity or
any other access to resources that can be hosted and offered by a network.</t>
          </li>
          <li>
            <t>A Software-Defined Networking (SDN) <xref target="RFC7149"/> <xref target="RFC7426"/> controller which is
responsible for maintaining endpoint-group based ACLs and mapping the
endpoint-group to the associated attributes information (e.g., IP/MAC address).
An SDN controller also behaves as a Policy Decision Point (PDP) <xref target="RFC3198"/>
and pushes the required access control policies to relevant Policy
Enforcement Points (PEPs) <xref target="RFC3198"/>.  A PDP is also known as
"policy server" <xref target="RFC2753"/>.  </t>
            <t>
An SDN controller may interact with an Authentication,
Authorization and Accounting (AAA) <xref target="RFC3539"/> server or a Network Access Server (NAS) <xref target="RFC7542"/>.</t>
          </li>
          <li>
            <t>A Network Access Server (NAS) entity which handles authentication
requests.  The NAS interacts with an AAA server to complete user
authentication using protocols like RADIUS <xref target="RFC2865"/>. When access is granted, the AAA
server provides the group identifier (group ID) to which the user
belongs when the user first logs onto the network. A new RADIUS attribute
is defined in <xref target="sec-radius"/> for this purpose.</t>
          </li>
          <li>
            <t>The AAA server provides a collection of authentication, authorization,
and accounting functions. The AAA server is responsible for centralized user
information management. The AAA server is preconfigured with user
credentials (e.g., user name and password), possible group identities
and related user attributes (users may be divided into different
groups based on different user attributes).</t>
          </li>
          <li>
            <t>The Policy Enforcement Point (PEP) is the central entity
which is responsible for enforcing appropriate access control
policies. A first deployment scenario assumes that
the SDN controller maps the group ID to the related common packet
header and delivers IP/MAC address based ACL policies to the
required PEPs.  Another deployment scenario may require that PEPs map incoming packets to their
associated source and/or destination endpoint-group IDs, and acts upon
the endpoint-group ID based ACL policies (e.g., a group identifier may be carried in packet headers such as discussed in
<xref section="6.2.3" sectionFormat="of" target="RFC9638"/>). More details are provided in <xref target="implement-considerations"/>.  </t>
            <t>
Multiple PEPs may be involved in a network.  </t>
            <t>
A PEP exposes a YANG-based interface (e.g., NETCONF <xref target="RFC6241"/>) to an SDN controller.</t>
          </li>
        </ul>
        <t><xref target="arch"/> provides the overall architecture and procedure for
   policy-based access control management.</t>
        <figure anchor="arch">
          <name>A Sample Architecture for Group-based Policy Management</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="416" width="536" viewBox="0 0 536 416" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 16,144 L 16,176" fill="none" stroke="black"/>
                <path d="M 16,320 L 16,352" fill="none" stroke="black"/>
                <path d="M 80,144 L 80,176" fill="none" stroke="black"/>
                <path d="M 80,320 L 80,352" fill="none" stroke="black"/>
                <path d="M 104,160 L 104,288" fill="none" stroke="black"/>
                <path d="M 152,144 L 152,192" fill="none" stroke="black"/>
                <path d="M 176,272 L 176,384" fill="none" stroke="black"/>
                <path d="M 192,192 L 192,272" fill="none" stroke="black"/>
                <path d="M 192,304 L 192,352" fill="none" stroke="black"/>
                <path d="M 224,144 L 224,192" fill="none" stroke="black"/>
                <path d="M 272,144 L 272,192" fill="none" stroke="black"/>
                <path d="M 288,32 L 288,64" fill="none" stroke="black"/>
                <path d="M 288,224 L 288,272" fill="none" stroke="black"/>
                <path d="M 344,64 L 344,88" fill="none" stroke="black"/>
                <path d="M 344,104 L 344,144" fill="none" stroke="black"/>
                <path d="M 344,192 L 344,224" fill="none" stroke="black"/>
                <path d="M 376,304 L 376,352" fill="none" stroke="black"/>
                <path d="M 392,32 L 392,64" fill="none" stroke="black"/>
                <path d="M 392,304 L 392,336" fill="none" stroke="black"/>
                <path d="M 416,144 L 416,192" fill="none" stroke="black"/>
                <path d="M 416,224 L 416,272" fill="none" stroke="black"/>
                <path d="M 512,304 L 512,336" fill="none" stroke="black"/>
                <path d="M 528,272 L 528,384" fill="none" stroke="black"/>
                <path d="M 288,32 L 392,32" fill="none" stroke="black"/>
                <path d="M 288,64 L 392,64" fill="none" stroke="black"/>
                <path d="M 8,96 L 448,96" fill="none" stroke="black"/>
                <path d="M 16,144 L 80,144" fill="none" stroke="black"/>
                <path d="M 152,144 L 224,144" fill="none" stroke="black"/>
                <path d="M 272,144 L 416,144" fill="none" stroke="black"/>
                <path d="M 80,160 L 104,160" fill="none" stroke="black"/>
                <path d="M 16,176 L 80,176" fill="none" stroke="black"/>
                <path d="M 224,176 L 272,176" fill="none" stroke="black"/>
                <path d="M 152,192 L 224,192" fill="none" stroke="black"/>
                <path d="M 272,192 L 416,192" fill="none" stroke="black"/>
                <path d="M 288,224 L 416,224" fill="none" stroke="black"/>
                <path d="M 176,272 L 528,272" fill="none" stroke="black"/>
                <path d="M 104,288 L 176,288" fill="none" stroke="black"/>
                <path d="M 192,304 L 376,304" fill="none" stroke="black"/>
                <path d="M 392,304 L 512,304" fill="none" stroke="black"/>
                <path d="M 16,320 L 80,320" fill="none" stroke="black"/>
                <path d="M 80,336 L 176,336" fill="none" stroke="black"/>
                <path d="M 392,336 L 512,336" fill="none" stroke="black"/>
                <path d="M 16,352 L 80,352" fill="none" stroke="black"/>
                <path d="M 192,352 L 376,352" fill="none" stroke="black"/>
                <path d="M 176,384 L 528,384" fill="none" stroke="black"/>
                <path class="jump" d="M 344,104 C 350,104 350,88 344,88" fill="none" stroke="black"/>
                <g class="text">
                  <text x="340" y="52">Orchestrator</text>
                  <text x="40" y="84">Service</text>
                  <text x="376" y="84">(Step</text>
                  <text x="412" y="84">1)</text>
                  <text x="40" y="116">Network</text>
                  <text x="236" y="132">Step</text>
                  <text x="264" y="132">4</text>
                  <text x="36" y="164">User</text>
                  <text x="68" y="164">#1</text>
                  <text x="184" y="164">AAA</text>
                  <text x="296" y="164">SDN</text>
                  <text x="356" y="164">Controller</text>
                  <text x="188" y="180">Server</text>
                  <text x="336" y="180">PDP</text>
                  <text x="452" y="228">Step</text>
                  <text x="480" y="228">5</text>
                  <text x="44" y="244">Step</text>
                  <text x="72" y="244">2</text>
                  <text x="220" y="244">Step</text>
                  <text x="248" y="244">3</text>
                  <text x="232" y="324">Network</text>
                  <text x="292" y="324">Access</text>
                  <text x="348" y="324">Server</text>
                  <text x="432" y="324">Firewall,</text>
                  <text x="492" y="324">etc.</text>
                  <text x="36" y="340">User</text>
                  <text x="68" y="340">#2</text>
                  <text x="272" y="340">(NAS)</text>
                  <text x="368" y="372">PEP</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
                                         .------------.
                                         |Orchestrator|
                                         '------+-----'
       Service                                  | (Step 1)
      ------------------------------------------)-------------
       Network                                  |
                                 Step 4         |
       .-------.        .--------.     .--------+--------.
       |User #1+--+     |  AAA   |     | SDN Controller  |
       '-------'  |     | Server +-----+      PDP        |
                  |     '----+---'     '--------+--------'
                  |          |                  |
                  |          |           +------+--------+  Step 5
         Step 2   |          | Step 3    |               |
                  |          |           |               |
                  |        .-+-----------+---------------+-------------.
                  +--------+                                           |
                           | .----------------------. .--------------. |
       .-------.           | | Network Access Server| |Firewall, etc.| |
       |User #2+-----------+ |       (NAS)          | '--------------' |
       '-------'           | '----------------------'                  |
                           |                      PEP                  |
                           '-------------------------------------------'
]]></artwork>
          </artset>
        </figure>
        <t>In reference to <xref target="arch"/>, the following typical flow is experienced:</t>
        <dl>
          <dt>Step 1:</dt>
          <dd>
            <t>Administrators (or a service orchestrator) configure an SDN
controller with network-level ACLs using the YANG module defined
in <xref target="sec-UCL"/>. An example is provided in <xref target="controller-ucl"/>.</t>
          </dd>
          <dt>Step 2:</dt>
          <dd>
            <t>When a user first logs onto the network, they are
required to be authenticated (e.g., using user name and password)
at the NAS.</t>
          </dd>
          <dt>Step 3:</dt>
          <dd>
            <t>The authentication request is then relayed to the AAA server
using a protocol such as RADIUS <xref target="RFC2865"/>. It is assumed that the
AAA server has been appropriately configured to store user credentials,
e.g., user name, password, group information, and other user attributes.
This document does not restrict what authentication method is used. Administrators
may refer to, e.g., <xref section="7.4" sectionFormat="of" target="I-D.ietf-radext-deprecating-radius"/>
for authentication method recommendations.
If the authentication request succeeds, the user is placed in a
user group with the identity returned to the NAS
as the authentication result (see <xref target="sec-radius"/>).
If the authentication fails, the user is not assigned any user
group, which also means that the user has no access; or the user
is assigned a special group with very limited access permissions
for the network (as a function of the local policy). ACLs are
enforced so that flows from that IP address are discarded
(or rate-limited) by the network.
In some implementations, the AAA server can be integrated with an SDN controller.</t>
          </dd>
          <dt>Step 4:</dt>
          <dd>
            <t>Either the AAA server or the NAS notifies an SDN controller
of the mapping between the user group ID and related common packet
header attributes (e.g., IP/MAC address). The exact details of how such notification is made are out the scope of this specification.</t>
          </dd>
          <dt>Step 5:</dt>
          <dd>
            <t>Either group or IP/MAC address based access control policies
are maintained on relevant PEPs under the SDN controller's management.
Whether the PEP enforces the group or IP/MAC address based ACL is
implementation specific. Both types of ACL policy may exist on
the PEP. <xref target="PEP-ucl"/> and <xref target="PEP-acl"/> elaborate on each case.</t>
          </dd>
        </dl>
      </section>
      <section anchor="endpoint-group">
        <name>Endpoint Group</name>
        <section anchor="user-group">
          <name>User Group</name>
          <t>The user group is determined by a set of predefined policy criteria
   (e.g., source IP address, geolocation data, time of day, or device certificate).
   It uses an identifier (user group ID) to represent the collective identity of
   a group of users. Users may be moved to different user groups if their
   composite attributes, environment, and/or local enterprise policy change.</t>
          <t>A user is authenticated, and classified at the AAA server, and
   assigned to a user group.  A user's group membership may change as
   aspects of the user change.  For example, if the user group
   membership is determined solely by the source IP address, then a
   given user's group ID will change when the user moves to a new
   IP address that falls outside of the range of addresses of the
   previous user group.</t>
          <t>This document does not make any assumption about how user groups are
   defined.  Such considerations are deployment specific and are out of
   scope.  However, and for illustration purposes, <xref target="ug-example"/> shows
   an example of how user group definitions may be characterized. User
   groups may share several common criteria.  That is, user group
   criteria are not mutually exclusive.  For example, the policy
   criteria of user groups R&amp;D Regular and R&amp;D BYOD may share the same
   set of users that belong to the R&amp;D organization, and differ only in
   the type of clients (firm-issued clients vs. users' personal
   clients).  Likewise, the same user may be assigned to different user
   groups depending on the time of day or the type of day (e.g.,
   weekdays versus weekends), etc.</t>
          <table anchor="ug-example">
            <name>User Group Example</name>
            <thead>
              <tr>
                <th align="left">Group Name</th>
                <th align="left">Group ID</th>
                <th align="left">Group Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">R&amp;D</td>
                <td align="left">foo-10</td>
                <td align="left">R&amp;D employees</td>
              </tr>
              <tr>
                <td align="left">R&amp;D BYOD</td>
                <td align="left">foo-11</td>
                <td align="left">Personal devices of R&amp;D employees</td>
              </tr>
              <tr>
                <td align="left">Sales</td>
                <td align="left">foo-20</td>
                <td align="left">Sales employees</td>
              </tr>
              <tr>
                <td align="left">VIP</td>
                <td align="left">foo-30</td>
                <td align="left">VIP employees</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="device-group">
          <name>Device Group</name>
          <t>The device group ID is an identifier that represents the collective
   identity of a group of enterprise end devices.  An enterprise device
   could be a server that hosts applications or software that deliver
   services to enterprise users.  It could also be an enterprise IoT
   device that serves a limited purpose, e.g., a printer that allows
   users to scan, print and send emails. <xref target="dg-example"/> shows an example
   of how device group definitions may be characterized.</t>
          <table anchor="dg-example">
            <name>Device Group Example</name>
            <thead>
              <tr>
                <th align="left">Group Name</th>
                <th align="left">Group ID</th>
                <th align="left">Group Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Workflow</td>
                <td align="left">bar-40</td>
                <td align="left">Workflow  resource servers</td>
              </tr>
              <tr>
                <td align="left">R&amp;D Resource</td>
                <td align="left">bar-50</td>
                <td align="left">R&amp;D resource servers</td>
              </tr>
              <tr>
                <td align="left">Printer Resource</td>
                <td align="left">bar-60</td>
                <td align="left">Printer resources</td>
              </tr>
            </tbody>
          </table>
          <t>Users accessing an enterprise device should be strictly controlled.
   Matching abstract device group ID instead of specified addresses in
   ACL polices helps shield the consequences of address change (e.g.,
   back-end VM-based server migration).</t>
        </section>
        <section anchor="application-group">
          <name>Application Group</name>
          <t>An application group is a collection of applications that share a common access control policies.
   A device may run multiple applications, and different policies might need to be
   applied to the applications and device. A single application may need to run on
   multiple devices/VMs/containers, the abstraction of application group eases the
   process of application migration. For example, the policy does not depend on the transport coordinates (i.e., 5-tuple).
   <xref target="ag-example"/> shows an example of how application group definitions may be characterized.</t>
          <table anchor="ag-example">
            <name>Application Group Example</name>
            <thead>
              <tr>
                <th align="left">Group Name</th>
                <th align="left">Group ID</th>
                <th align="left">Group Description</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">Audio/Video Streaming</td>
                <td align="left">baz-70</td>
                <td align="left">Audio/Video conferencing application</td>
              </tr>
              <tr>
                <td align="left">Instant messaging</td>
                <td align="left">baz-80</td>
                <td align="left">Messaging application</td>
              </tr>
              <tr>
                <td align="left">document collaboration</td>
                <td align="left">baz-90</td>
                <td align="left">Real-time document editing application</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="the-ucl-extension-to-the-acl-module">
      <name>The UCL Extension to the ACL Module</name>
      <section anchor="module-overview">
        <name>Module Overview</name>
        <t>This module specifies an extension to the "ietf-access-control-list" module <xref target="RFC8519"/>. This extension adds
   endpoint groups so that an endpoint group identifier can be matched upon, and also
   enable access control policy activation based on date and time conditions.</t>
        <t><xref target="ucl-tree"/> provides the tree structure of the "ietf-ucl-acl" module.</t>
        <figure anchor="ucl-tree">
          <name>UCL Extension</name>
          <artwork align="center"><![CDATA[
module: ietf-ucl-acl

  augment /acl:acls:
    +--rw endpoint-groups {uacl:group}?
       +--rw endpoint-group* [group-id]
          +--rw group-id      string
          +--rw group-type?   identityref
  augment /acl:acls/acl:acl/acl:aces/acl:ace/acl:matches:
    +--rw endpoint-group {uacl:match-on-group}?
       +--rw source-group-id?        group-id-reference
       +--rw destination-group-id?   group-id-reference
  augment /acl:acls/acl:acl/acl:aces/acl:ace:
    +--rw effective-schedule {uacl:schedule}?
       +--rw (schedule-type)?
          +--:(period)
          |  +--rw period
          |     +--rw period-description?     string
          |     +--rw period-start            yang:date-and-time
          |     +--rw time-zone-identifier?   sys:timezone-name
          |     +--rw (period-type)?
          |        +--:(explicit)
          |        |  +--rw period-end?       yang:date-and-time
          |        +--:(duration)
          |           +--rw duration?         duration
          +--:(recurrence)
             +--rw recurrence {schedule:icalendar-recurrence}?
                +--rw recurrence-first
                |  +--rw start-time?             yang:date-and-time
                |  +--rw duration?               duration
                |  +--rw time-zone-identifier?   sys:timezone-name
                +--rw (recurrence-end)?
                |  +--:(until)
                |  |  +--rw until?              yang:date-and-time
                |  +--:(count)
                |     +--rw count?              uint32
                +--rw recurrence-description?   string
                +--rw frequency                 identityref
                +--rw interval?                 uint32
                +--rw period* [period-start]
                |  +--rw period-description?     string
                |  +--rw period-start            yang:date-and-time
                |  +--rw time-zone-identifier?   sys:timezone-name
                |  +--rw (period-type)?
                |     +--:(explicit)
                |     |  +--rw period-end?       yang:date-and-time
                |     +--:(duration)
                |        +--rw duration?         duration
                +--rw bysecond*                 uint32
                +--rw byminute*                 uint32
                +--rw byhour*                   uint32
                +--rw byday* [weekday]
                |  +--rw direction*   int32
                |  +--rw weekday      schedule:weekday
                +--rw bymonthday*               int32
                +--rw byyearday*                int32
                +--rw byyearweek*               int32
                +--rw byyearmonth*              uint32
                +--rw bysetpos*                 int32
                +--rw workweek-start?           schedule:weekday
                +--rw exception-dates*          yang:date-and-time
]]></artwork>
        </figure>
        <t>The first part of the "ietf-ucl-acl" module augments the "acl" list in the
   "ietf-access-control-list" module <xref target="RFC8519"/> with an "endpoint-groups" container
   having a list of "endpoint group" inside, each entry has a "group-id" that uniquely
   identifies the endpoint group and a "group-type" parameter to specify the endpoint group type.</t>
        <ul empty="true">
          <li>
            <t>"group-id" is defined as a string rather than unsigned integer (e.g., uint32) to accommodate deployments which require some identification hierarchy within a domain. Such a hierarchy is meant to ease coordination within an administrative domain. There might be cases where a domain needs to tag packets with the group they belong to. The tagging does not need to mirror exactly the "group id" used to populate the policy. How the "group-id" string is mapped to the tagging or field in the packet header in encapsulation scenario is outside the scope of this document. Augmentation may be considered in the future to cover encapsulation considerations.</t>
          </li>
        </ul>
        <t>The second part of the "ietf-ucl-acl" module augments the "matches" container in the
   "ietf-access-control-list" module <xref target="RFC8519"/> so that a source and/or destination endpoint group index
   can be referenced as the match criteria.</t>
        <t>The third part of the module augments the "ace" list in the "ietf-access-control-list"
   module <xref target="RFC8519"/> with date and time specific parameters to allow ACE to be
   activated based on a date/time condition. Two types of time range are defined,
   which reuse "recurrence" and "period" groupings defined in the "ietf-schedule"
   YANG module in <xref target="I-D.ietf-netmod-schedule-yang"/>, respectively.</t>
      </section>
      <section anchor="sec-UCL">
        <name>The "ietf-ucl-acl" YANG Module</name>
        <t>This module imports types and groupings defined in the "ietf-schedule" module
   <xref target="I-D.ietf-netmod-schedule-yang"/>. It also augments the "ietf-access-control-list" module (<xref section="4.1" sectionFormat="of" target="RFC8519"/>).</t>
        <sourcecode markers="true" name="ietf-ucl-acl@2025-03-11.yang"><![CDATA[
module ietf-ucl-acl {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-ucl-acl";
  prefix uacl;

  import ietf-access-control-list {
    prefix acl;
    reference
      "RFC 8519: YANG Data Model for Network Access
                 Control Lists (ACLs)";
  }
  import ietf-schedule {
    prefix schedule;
    reference
      "RFC SSSS: A Common YANG Data Model for Scheduling";
  }

  organization
    "IETF OPSWG Working Group";
  contact
    "WG Web: <https://datatracker.ietf.org/wg/opsawg/>
     WG List: <mailto:opsawg@ietf.org>

     Editor:   Qiufang Ma
               <mailto:maqiufang1@huawei.com>
     Author:   Qin Wu
               <mailto:bill.wu@huawei.com>
     Editor:   Mohamed Boucadair
               <mailto:mohamed.boucadair@orange.com>
     Author:   Daniel King
               <mailto:d.king@lancaster.ac.uk>";
  description
    "The User group based Control List (UCL) YANG module augments
     the IETF access control lists (ACLs) module and is meant to
     ensure consistent enforcement of ACL policies based on
      the group identity.

     Copyright (c) 2025 IETF Trust and the persons identified
     as authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with
     or without modification, is permitted pursuant to, and
     subject to the license terms contained in, the Revised
     BSD License set forth in Section 4.c of the IETF Trust's
     Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found
     at the YANG Parameters registry group
     (https://www.iana.org/assignments/yang-parameters).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.";

  revision 2025-03-11 {
    description
      "Initial revision.";
    reference
      "RFC XXXX: A YANG Data Model and RADIUS Extension for
                 Policy-based Network Access Control";
  }

  feature schedule {
    description
      "Indicates support of schedule-based ACEs.";
  }

  feature match-on-group {
    description
      "Indicates support of matching on endpoint groups.";
  }
  
  feature group {
    if-feature "uacl:match-on-group";
    description
      "Indicates support of group-based ACLs.";
  }
  
  feature mixed-ipv4-group {
    if-feature "acl:match-on-ipv4 and uacl:match-on-group";
    description
      "IPv4 and group ACL combinations supported.";
  }
  
  feature mixed-ipv6-group {
    if-feature "acl:match-on-ipv6 and uacl:match-on-group";
    description
      "IPv6 and group ACL combinations supported.";
  }
  
  feature mixed-ipv4-ipv6-group {
    if-feature "acl:match-on-ipv4 and acl:match-on-ipv6 and "
             + "uacl:match-on-group";
    description
      "IPv4, IPv6, and group ACL combinations supported.";
  }
  
  feature mixed-eth-group {
    if-feature "acl:match-on-eth and uacl:match-on-group";
    description
      "Eth and group ACL combinations supported.";    
  }
  
  feature mixed-eth-ipv4-group {
    if-feature "acl:match-on-eth and acl:match-on-ipv4 and "
             + "uacl:match-on-group";
    description
      "Eth, IPv4, and group ACL combinations supported.";       
  }
  
  feature mixed-eth-ipv6-group {
    if-feature "acl:match-on-eth and acl:match-on-ipv6 and "
             + "uacl:match-on-group";
    description
      "Eth, IPv6, and group ACL combinations supported.";    
  }
  
  feature mixed-eth-ipv4-ipv6-group {
    if-feature "acl:match-on-eth and acl:match-on-ipv4 and "
             + "acl:match-on-ipv6 and uacl:match-on-group";
    description
      "Eth, IPv4, IPv6, and group ACL combinations supported.";   
  }

  identity group-acl-type {
    if-feature "group";
    base acl:acl-base;
    description
      "An Access Control List (ACL) that matches based on an endpoint
       group identity, which can represent the collective identity of
       a group of authenticated users, end devices, or applications.
       An endpoint group identity may be carried in the outer/inner 
       packet header (e.g., via NVO3 encapsulation), may also not 
       correspond to any field in the packet header. Matching on 
       Layer 4 header fields may also exist in the Access Control 
       Entries (ACEs).";
  }
  
  identity mixed-ipv4-group-type {
    if-feature "mixed-ipv4-group";
    base acl:ipv4-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the IPv4 header and endpoint group identities, which can
       represent the collective identity of a group of authenticated
       users, end devices, or applications. Matching on Layer 4 
       header fields may also exist in the ACEs.";
  }
  
  identity mixed-ipv6-group-type {
    if-feature "mixed-ipv6-group";
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the IPv6 header and endpoint group identities, which can
       represent the collective identity of a group of authenticated
       users, end devices, or applications. Matching on Layer 4 
       header fields may also exist in the ACEs.";
  }
  
  identity mixed-ipv4-ipv6-group-type {
    if-feature "mixed-ipv4-ipv6-group";
    base acl:ipv4-acl-type;
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the IPv4 header, IPv6 header, and endpoint group
       identities, which can represent the collective identity of a
       group of authenticated users, end devices, or applications.
       Matching on Layer 4 header fields may also exist in the
       ACEs.";
  }
  
  identity mixed-eth-group-type {
    if-feature "mixed-eth-group";
    base acl:eth-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header and endpoint group identities,
       which can represent the collective identity of a group of
       authenticated users, end devices, or applications. Matching 
       on Layer 4 header fields may also exist in the ACEs.";
  }
  
  identity mixed-eth-ipv4-group-type {
    if-feature "mixed-eth-ipv4-group";
    base acl:eth-acl-type;
    base acl:ipv4-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header, IPv4 header, and endpoint group 
       identities, which can represent the collective identity of a 
       group of authenticated users, end devices or applications. 
       Matching on Layer 4 header fields may also exist in the
       ACEs.";
  }  
  
  identity mixed-eth-ipv6-group-type {
    if-feature "mixed-eth-ipv6-group";
    base acl:eth-acl-type;
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header, IPv6 header, and endpoint group 
       identities, which can represent the collective identity of 
       a group of authenticated users, end devices or applications. 
       Matching on Layer 4 header fields may also exist in the
       ACEs.";
  }  
  
  identity mixed-eth-ipv4-ipv6-group-type {
    if-feature "mixed-eth-ipv4-ipv6-group";
    base acl:eth-acl-type;
    base acl:ipv4-acl-type;    
    base acl:ipv6-acl-type;
    base uacl:group-acl-type;
    description
      "An ACL that contains a mix of entries that match on fields
       in the Ethernet header, IPv4 header, IPv6 header, and endpoint 
       group identities, which can represent the collective identity 
       of a group of authenticated users, end devices or 
       applications. Matching on Layer 4 header fields may also exist 
       in the ACEs.";
  }  
    
  identity endpoint-group-type {
    description
      "Identity for the type of endpoint group.";
  }
  
  identity user-group {
    base uacl:endpoint-group-type;
    description
      "Identity for the user endpoint group.";
  }
  
  identity device-group {
    base uacl:endpoint-group-type;
    description
      "Identity for the device endpoint group.";
  }
  
  identity application-group {
    base uacl:endpoint-group-type;
    description
      "Identity for the application endpoint group.";
  }
  
  typedef group-id-reference {
    type leafref {
      path "/acl:acls/uacl:endpoint-groups"
         + "/uacl:endpoint-group/uacl:group-id";
    }
    description
      "Defines a reference to a group identifier.";
  }

  augment "/acl:acls" {
    if-feature "uacl:group";
    description
      "Adds a container for endpoint group definition.";
    container endpoint-groups {
      description
        "Defines a container for the endpoint group list.";
      list endpoint-group {
        key "group-id";
        description
          "Definition of the endpoint group list.";
        leaf group-id {
          type string {
            length "1..64";
          }
          description
            "The endpoint group identifier that uniquely identifies
             an endpoint group.";
        }
        leaf group-type {
          type identityref {
            base endpoint-group-type;
          }
          description
            "Specifies the endpoint group type.";
        }
      }
    }
  }

  augment "/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches" {
    if-feature "uacl:match-on-group";
    description
      "Specifies how a source and/or destination endpoint group 
       index can be referenced as the match criteria in the ACEs.";
    container endpoint-group {
      when "derived-from-or-self(/acl:acls/acl:acl/acl:type, "
         + "'uacl:group-acl-type')";
      description
        "Adds new match types.";
      leaf source-group-id {
        type group-id-reference;
        description
          "The matched source endpoint group ID.";
      }
      leaf destination-group-id {
        type group-id-reference;
        description
          "The matched destination endpoint group ID.";
      }
    }
  }

  augment "/acl:acls/acl:acl/acl:aces/acl:ace" {
    if-feature "uacl:schedule";
    description
      "Adds schedule parameters to allow the ACE to take effect  
       based on date and time.";
    container effective-schedule {
      description
        "Defines when the access control entry rules 
         are in effect based on date and time condition.

         If it is not configured, the access control entry
         is immediately and always in effect.";
      choice schedule-type {
        description
          "Choice based on the type of the time range.";
        container period {
          description
            "The ACE takes effect based on a precise period of 
             time.";        
            uses schedule:period-of-time;
        }
        container recurrence {
          if-feature "schedule:icalendar-recurrence";
          description
            "The ACE takes effect based on a recurrence rule.";
          uses schedule:icalendar-recurrence;          
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="sec-radius">
      <name>User Access Control Group ID RADIUS Attribute</name>
      <t>The User-Access-Group-ID RADIUS attribute is
defined with a globally unique name. The definition of the attribute
follows the guidelines in <xref section="2.7.1" sectionFormat="of" target="RFC6929"/>.  This attribute
is used to indicate the user group ID to be used by the NAS.  When
the User-Access-Group-ID RADIUS attribute is present in the RADIUS
Access-Accept, the system applies the related access control to the
users after it authenticates.</t>
      <t>The User-Access-Group-ID Attribute is of type "string" as defined in
<xref section="3.5" sectionFormat="of" target="RFC8044"/>.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MAY</bcp14> appear in a RADIUS
Access-Accept packet.  It <bcp14>MAY</bcp14> also appear in a RADIUS Access-Request packet
as a hint to the RADIUS server to indicate a preference.  However,
the server is not required to honor such a preference. If more than
one instance of the User-Access-Group-ID Attribute appears in a RADIUS
Access-Accept packet, this means that the user is a member of many groups.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MAY</bcp14> appear in a RADIUS CoA-Request
packet.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MAY</bcp14> appear in a RADIUS Accounting-Request
packet. Specifically, this may be used by a NAS to acknowledge that the attribute
was received in the RADIUS Access-Request and the NAS is enforcing that policy.</t>
      <t>The User-Access-Group-ID Attribute <bcp14>MUST NOT</bcp14> appear in any other
RADIUS packet.</t>
      <t>The User-Access-Group-ID Attribute is structured as follows:</t>
      <dl newline="true">
        <dt>Type</dt>
        <dd>
          <t>TBA1</t>
        </dd>
        <dt>Length</dt>
        <dd>
          <t>This field indicates the total length, in octets, of all fields of
   this attribute, including the Type, Length, Extended-Type, and the
   "Value".</t>
        </dd>
        <dt/>
        <dd>
          <t>The Length <bcp14>MUST</bcp14> be at most 67 octets. The maximum length is 67 octets to accommodate the maximum group ID of 64 octets plus one octet for Type, one octet for Length, and one octet for Extended-Length.</t>
        </dd>
        <dt>Data Type</dt>
        <dd>
          <t>string (<xref section="3.5" sectionFormat="of" target="RFC8044"/>)</t>
        </dd>
        <dt>Value</dt>
        <dd>
          <t>This field contains the user group ID.</t>
        </dd>
      </dl>
    </section>
    <section anchor="radius-attributes">
      <name>RADIUS Attributes</name>
      <t><xref target="rad-att"/> provides a guide as what type of RADIUS packets
   that may contain User-Access-Group-ID Attribute, and in what
   quantity.</t>
      <table anchor="rad-att">
        <name>Table of Attributes</name>
        <thead>
          <tr>
            <th align="left">Access-Request</th>
            <th align="left">Access-Accept</th>
            <th align="left">Access-Reject</th>
            <th align="left">Challenge</th>
            <th align="left">Attribute</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0+</td>
            <td align="left">0+</td>
            <td align="left">0</td>
            <td align="left">0</td>
            <td align="left">User-Access-Group-ID</td>
          </tr>
          <tr>
            <td align="left">Accounting-Request</td>
            <td align="left">CoA-Request</td>
            <td align="left">CoA-ACK</td>
            <td align="left">CoA-NACK</td>
            <td align="left">Attribute</td>
          </tr>
          <tr>
            <td align="left">0+</td>
            <td align="left">0+</td>
            <td align="left">0</td>
            <td align="left">0</td>
            <td align="left">User-Access-Group-ID</td>
          </tr>
        </tbody>
      </table>
      <t>Notation for <xref target="rad-att"/>:</t>
      <dl>
        <dt>0</dt>
        <dd>
          <t>This attribute <bcp14>MUST NOT</bcp14> be present in packet.</t>
        </dd>
        <dt>0+</dt>
        <dd>
          <t>Zero or more instances of this attribute <bcp14>MAY</bcp14> be present in packet.</t>
        </dd>
      </dl>
    </section>
    <section anchor="implement-considerations">
      <name>Operational Considerations</name>
      <t>The UCL model can be implemented in different ways.</t>
      <t>In some cases, the UCL data model is implemented at the network/administrative domain
   level with an SDN controller maintaining the dynamical mapping from endpoint
   group ID to IP/transport fields (e.g., the 5-tuple) and programing the PEPs with
   IP address/5-tuple based ACLs. In such cases, PEPs do not require to implement
   specific logic (including hardware) compared to the enforcement of conventional ACLs.</t>
      <t>It is possible for the UCL data model to be implemented at the device level.
   While it eliminates the need for an SDN controller to interact frequently
   with the PEPs for reasons like the user's context of network connection change
   or VM/application migration, dedicated hardware/software support might be needed
   for PEPs to understand the endpoint group identifier. In scenarios where the NAS
   behaves as the PEP which acquires the source and/or destination endpoint group
   ID from the AAA server, ACL policy enforcement based on the group identity without
   being encapsulated into packet headers might affect the forwarding performance.
   Implementations need to evaluate the operational tradeoff (flexibility brought
   to the network vs. the complexity of implementation) carefully. Such assessment
   is out of scope of this document.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="yang">
        <name>YANG</name>
        <t>This section is modeled after the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        <t>The "ietf-ucl-acl" YANG module defines a data model
   that is designed to be accessed via YANG-based management protocols such
   as NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management
   protocols (1) have to use a secure transport layer (e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and
   QUIC <xref target="RFC9000"/>) and (2) have to use mutual authentication.</t>
        <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
   provides the means to restrict access for particular NETCONF or
   RESTCONF users to a preconfigured subset of all available NETCONF or
   RESTCONF protocol operations and content.</t>
        <t>There are a number of data nodes defined in this YANG module that are
   writable/creatable/deletable (i.e., "config true", which is the
   default).  All writable data nodes are likely to be sensitive or
   vulnerable in some network environments.  Write
   operations (e.g., edit-config) and delete operations to these data
   nodes without proper protection or authentication can have a negative
   effect on network operations.  The following subtrees and data nodes
   have particular sensitivities/vulnerabilities:</t>
        <ul spacing="normal">
          <li>
            <dl>
              <dt>/acl:acls/uacl:endpoint-groups/uacl:endpoint-group:</dt>
              <dd>
                <t>This list specifies all the endpoint group entries. Unauthorized write access to this
list can allow intruders to modify the entries so as to forge an endpoint
group that does not exist or maliciously delete an existing endpoint group,
which could be used to craft an attack.</t>
              </dd>
            </dl>
          </li>
          <li>
            <dl>
              <dt>/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches/uacl:endpoint-group:</dt>
              <dd>
                <t>This subtree specifies a source and/or endpoint group index as match criteria in the
ACEs. Unauthorized write access to this data node may allow intruders to
modify the group identity so as to permit access that should not be
permitted, or deny access that should be permitted.</t>
              </dd>
            </dl>
            <t>
Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
          </li>
          <li>
            <dl>
              <dt>/acl:acls/acl:acl/acl:aces/acl:ace/uacl:effective-schedule:</dt>
              <dd>
                <t>This subtree specifies when the access control entry rules are in effect. An
unauthorized read access of the list will allow the attacker to determine
which rules are in effect, to better craft an attack.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="radius">
        <name>RADIUS</name>
        <t>RADIUS-related security considerations are discussed in <xref target="RFC2865"/>.</t>
        <t>This document targets deployments where a trusted relationship is in
   place between the RADIUS client and server with communication
   optionally secured by IPsec or Transport Layer Security (TLS)
   <xref target="RFC6614"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="yang-1">
        <name>YANG</name>
        <t>This document registers the following URIs in the "IETF XML Registry" <xref target="RFC3688"/>.</t>
        <artwork><![CDATA[
        URI: urn:ietf:params:xml:ns:yang:ietf-ucl-acl
        Registrant Contact: The IESG.
        XML: N/A, the requested URI is an XML namespace.
]]></artwork>
        <t>This document registers the following YANG modules in the "YANG Module Names"
   registry <xref target="RFC6020"/>.</t>
        <artwork><![CDATA[
        name:               ietf-ucl-acl
        prefix:             uacl
        namespace:          urn:ietf:params:xml:ns:yang:ietf-ucl-acl
        maintained by IANA? N
        reference:          RFC XXXX
]]></artwork>
      </section>
      <section anchor="radius-1">
        <name>RADIUS</name>
        <t>This document requests IANA to assign a new RADIUS attribute type from the IANA
   registry "Radius Attribute Types" <xref target="RADIUS-Types"/>:</t>
        <table anchor="rad-reg">
          <name>RADIUS Attribute</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
              <th align="left">Data Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBA1</td>
              <td align="left">User-Access-Group-ID</td>
              <td align="left">string</td>
              <td align="left">This-Document</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8519">
          <front>
            <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
            <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
            <author fullname="S. Agarwal" initials="S." surname="Agarwal"/>
            <author fullname="L. Huang" initials="L." surname="Huang"/>
            <author fullname="D. Blair" initials="D." surname="Blair"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device. Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8519"/>
          <seriesInfo name="DOI" value="10.17487/RFC8519"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-schedule-yang">
          <front>
            <title>A Common YANG Data Model for Scheduling</title>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Daniel King" initials="D." surname="King">
              <organization>Lancaster University</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   This document defines common types and groupings that are meant to be
   used for scheduling purposes such as event, policy, services, or
   resources based on date and time.  For the sake of better modularity,
   the YANG module includes a set of recurrence-related groupings with
   varying levels of representation (i.e., from basic to advanced) to
   accommodate a variety of requirements.  It also defines groupings for
   validating requested schedules and reporting scheduling status.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-schedule-yang-10"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6929">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS) Protocol Extensions</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>The Remote Authentication Dial-In User Service (RADIUS) protocol is nearing exhaustion of its current 8-bit Attribute Type space. In addition, experience shows a growing need for complex grouping, along with attributes that can carry more than 253 octets of data. This document defines changes to RADIUS that address all of the above problems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6929"/>
          <seriesInfo name="DOI" value="10.17487/RFC6929"/>
        </reference>
        <reference anchor="RFC8044">
          <front>
            <title>Data Types in RADIUS</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>RADIUS specifications have used data types for two decades without defining them as managed entities. During this time, RADIUS implementations have named the data types and have used them in attribute definitions. This document updates the specifications to better follow established practice. We do this by naming the data types defined in RFC 6158, which have been used since at least the publication of RFC 2865. We provide an IANA registry for the data types and update the "RADIUS Attribute Types" registry to include a Data Type field for each attribute. Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice. This document updates RFCs 2865, 3162, 4072, 6158, 6572, and 7268.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8044"/>
          <seriesInfo name="DOI" value="10.17487/RFC8044"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RADIUS-Types" target="http://www.iana.org/assignments/radius-types">
          <front>
            <title>RADIUS Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-netmod-acl-extensions">
          <front>
            <title>Extensions to the Access Control Lists (ACLs) YANG Model</title>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Samier Barguil" initials="S." surname="Barguil">
              <organization>Nokia</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="3" month="April" year="2025"/>
            <abstract>
              <t>   RFC 8519 defines a YANG data model for Access Control Lists (ACLs).
   This document specifies a set of extensions that fix many of the
   limitations of the ACL model as initially defined in RFC 8519.
   Specifically, it introduces augmentations to the ACL base model to
   enhance its functionality and applicability.

   The document also defines IANA-maintained modules for ICMP types and
   IPv6 extension headers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-acl-extensions-17"/>
        </reference>
        <reference anchor="RFC9797">
          <front>
            <title>Randomized and Changing Media Access Control (MAC) Addresses: Context, Network Impacts, and Use Cases</title>
            <author fullname="J. Henry" initials="J." surname="Henry"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>To limit the privacy issues created by the association between a device, its traffic, its location, and its user in IEEE 802 networks, client vendors and client OS vendors have started implementing Media Access Control (MAC) address randomization. This technology is particularly important in Wi-Fi networks (defined in IEEE 802.11) due to the over-the-air medium and device mobility. When such randomization happens, some in-network states may break, which may affect network connectivity and user experience. At the same time, devices may continue using other stable identifiers, defeating the purpose of MAC address randomization.</t>
              <t>This document lists various network environments and a range of network services that may be affected by such randomization. This document then examines settings where the user experience may be affected by in-network state disruption. Last, this document examines some existing frameworks that maintain user privacy while preserving user quality of experience and network operation efficiency.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9797"/>
          <seriesInfo name="DOI" value="10.17487/RFC9797"/>
        </reference>
        <reference anchor="RFC9638">
          <front>
            <title>Network Virtualization over Layer 3 (NVO3) Encapsulation Considerations</title>
            <author fullname="S. Boutros" initials="S." surname="Boutros"/>
            <author fullname="D. Eastlake 3rd" initials="D." role="editor" surname="Eastlake 3rd"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>The IETF Network Virtualization Overlays (NVO3) Working Group developed considerations for a common encapsulation that addresses various network virtualization overlay technical concerns. This document provides a record, for the benefit of the IETF community, of the considerations arrived at by the NVO3 Working Group starting from the output of the NVO3 encapsulation Design Team. These considerations may be helpful with future deliberations by working groups over the choice of encapsulation formats.</t>
              <t>There are implications of having different encapsulations in real environments consisting of both software and hardware implementations and within and spanning multiple data centers. For example, Operations, Administration, and Maintenance (OAM) functions such as path MTU discovery become challenging with multiple encapsulations along the data path.</t>
              <t>Based on these considerations, the NVO3 Working Group determined that Generic Network Virtualization Encapsulation (Geneve) with a few modifications is the common encapsulation. This document provides more details, particularly in Section 7.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9638"/>
          <seriesInfo name="DOI" value="10.17487/RFC9638"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC3198">
          <front>
            <title>Terminology for Policy-Based Management</title>
            <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
            <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
            <author fullname="J. Strassner" initials="J." surname="Strassner"/>
            <author fullname="M. Scherling" initials="M." surname="Scherling"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="A. Huynh" initials="A." surname="Huynh"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="J. Perry" initials="J." surname="Perry"/>
            <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
            <date month="November" year="2001"/>
            <abstract>
              <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3198"/>
          <seriesInfo name="DOI" value="10.17487/RFC3198"/>
        </reference>
        <reference anchor="RFC2475">
          <front>
            <title>An Architecture for Differentiated Services</title>
            <author fullname="S. Blake" initials="S." surname="Blake"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="E. Davies" initials="E." surname="Davies"/>
            <author fullname="Z. Wang" initials="Z." surname="Wang"/>
            <author fullname="W. Weiss" initials="W." surname="Weiss"/>
            <date month="December" year="1998"/>
            <abstract>
              <t>This document defines an architecture for implementing scalable service differentiation in the Internet. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2475"/>
          <seriesInfo name="DOI" value="10.17487/RFC2475"/>
        </reference>
        <reference anchor="RFC7149">
          <front>
            <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="C. Jacquenet" initials="C." surname="Jacquenet"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>Software-Defined Networking (SDN) has been one of the major buzz words of the networking industry for the past couple of years. And yet, no clear definition of what SDN actually covers has been broadly admitted so far. This document aims to clarify the SDN landscape by providing a perspective on requirements, issues, and other considerations about SDN, as seen from within a service provider environment.</t>
              <t>It is not meant to endlessly discuss what SDN truly means but rather to suggest a functional taxonomy of the techniques that can be used under an SDN umbrella and to elaborate on the various pending issues the combined activation of such techniques inevitably raises. As such, a definition of SDN is only mentioned for the sake of clarification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7149"/>
          <seriesInfo name="DOI" value="10.17487/RFC7149"/>
        </reference>
        <reference anchor="RFC7426">
          <front>
            <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
            <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
            <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
            <author fullname="S. Denazis" initials="S." surname="Denazis"/>
            <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
            <author fullname="D. Meyer" initials="D." surname="Meyer"/>
            <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
            <date month="January" year="2015"/>
            <abstract>
              <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7426"/>
          <seriesInfo name="DOI" value="10.17487/RFC7426"/>
        </reference>
        <reference anchor="RFC2753">
          <front>
            <title>A Framework for Policy-based Admission Control</title>
            <author fullname="R. Yavatkar" initials="R." surname="Yavatkar"/>
            <author fullname="D. Pendarakis" initials="D." surname="Pendarakis"/>
            <author fullname="R. Guerin" initials="R." surname="Guerin"/>
            <date month="January" year="2000"/>
            <abstract>
              <t>This document is concerned with specifying a framework for providing policy-based control over admission control decisions. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2753"/>
          <seriesInfo name="DOI" value="10.17487/RFC2753"/>
        </reference>
        <reference anchor="RFC3539">
          <front>
            <title>Authentication, Authorization and Accounting (AAA) Transport Profile</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Wood" initials="J." surname="Wood"/>
            <date month="June" year="2003"/>
            <abstract>
              <t>This document discusses transport issues that arise within protocols for Authentication, Authorization and Accounting (AAA). It also provides recommendations on the use of transport by AAA protocols. This includes usage of standards-track RFCs as well as experimental proposals. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3539"/>
          <seriesInfo name="DOI" value="10.17487/RFC3539"/>
        </reference>
        <reference anchor="RFC7542">
          <front>
            <title>The Network Access Identifier</title>
            <author fullname="A. DeKok" initials="A." surname="DeKok"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>In order to provide inter-domain authentication services, it is necessary to have a standardized method that domains can use to identify each other's users. This document defines the syntax for the Network Access Identifier (NAI), the user identifier submitted by the client prior to accessing resources. This document is a revised version of RFC 4282. It addresses issues with international character sets and makes a number of other corrections to RFC 4282.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7542"/>
          <seriesInfo name="DOI" value="10.17487/RFC7542"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="27" month="August" year="2025"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks.  They have proven their utility as
   replacements for the previous UDP (RFC 2865) and TCP (RFC 6613)
   transports.  With that knowledge, the continued use of insecure
   transports for RADIUS has serious and negative implications for
   privacy and security.

   The publication of the "BlastRADIUS" exploit has also shown that
   RADIUS security needs to be updated.  It is no longer acceptable for
   RADIUS to rely on MD5 for security.  It is no longer acceptable to
   send device or location information in clear text across the wider
   Internet.  This document therefore deprecates many insecure practices
   in RADIUS, and mandates support for secure TLS-based transport
   layers.  We also discuss related security issues with RADIUS, and
   give recommendations for practices which increase both security and
   privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-07"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="I-D.smith-vxlan-group-policy">
          <front>
            <title>VXLAN Group Policy Option</title>
            <author fullname="Michael Smith" initials="M." surname="Smith">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Larry Kreeger" initials="L." surname="Kreeger">
              <organization>Arrcus, Inc.</organization>
            </author>
            <date day="22" month="October" year="2018"/>
            <abstract>
              <t>   This document defines a backward compatible extension to Virtual
   eXtensible Local Area Network (VXLAN) that allows a Tenant System
   Interface (TSI) Group Identifier to be carried for the purposes of
   policy enforcement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-smith-vxlan-group-policy-05"/>
        </reference>
        <reference anchor="I-D.you-i2nsf-user-group-based-policy">
          <front>
            <title>User-group-based Security Policy for Service Layer</title>
            <author fullname="Jianjie You" initials="J." surname="You">
              <organization>Huawei</organization>
            </author>
            <author fullname="Myo Zarny" initials="M." surname="Zarny">
              <organization>Goldman Sachs</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>France Telecom</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>France Telecom</organization>
            </author>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei</organization>
            </author>
            <author fullname="John Strassner" initials="J." surname="Strassner">
              <organization>Huawei</organization>
            </author>
            <author fullname="Sumandra Majee" initials="S." surname="Majee">
              <organization>F5 Networks</organization>
            </author>
            <date day="8" month="July" year="2016"/>
            <abstract>
              <t>   This draft defines the User-group Aware Policy Control (UAPC)
   framework, which facilitates consistent enforcement of security
   policies based on user group identity.  Policies are used to control
   security policy enforcement using a policy server and a security
   controller.  Northbound APIs are also discussed.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-you-i2nsf-user-group-based-policy-02"/>
        </reference>
        <reference anchor="I-D.yizhou-anima-ip-to-access-control-groups">
          <front>
            <title>Autonomic IP Address To Access Control Group ID Mapping</title>
            <author fullname="Yizhou Li" initials="Y." surname="Li">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Shen" initials="L." surname="Shen">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Yujing Zhou" initials="Y." surname="Zhou">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="15" month="November" year="2021"/>
            <abstract>
              <t>   This document defines the autonomic technical Objectives for IP
   address/prefix to access control group IDs mapping information.  The
   Objectives defined can be used in Generic Autonomic Signaling
   Protocol (GRASP) to make the policy enforcement point receive IP
   address and its tied access control groups information directly from
   the access authentication points and facilitate the group based
   policy enforcement.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-yizhou-anima-ip-to-access-control-groups-02"/>
        </reference>
      </references>
    </references>
    <?line 1060?>

<section anchor="examples-usage">
      <name>Examples Usage</name>
      <section anchor="controller-ucl">
        <name>Configuring the Controller Using Group based ACL</name>
        <t>Let's consider an organization that would like to manage the access of R&amp;D
   employees that bring personally owned devices (BYOD) into the workplace.</t>
        <t>The access requirements are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Permit traffic from R&amp;D BYOD of employees, destined to R&amp;D employees'
devices every work day from 8:00:00 to 18:00:00 UTC, starting in January 1st, 2026.</t>
          </li>
          <li>
            <t>Deny traffic from R&amp;D BYOD of employees, destined to finance servers
located in the enterprise DC network starting at 8:30:00 of January 20,
2026 with an offset of -08:00 from UTC (Pacific Standard Time) and ending
at 18:00:00 in Pacific Standard Time on December 31, 2026.</t>
          </li>
        </ul>
        <t>The example shown in <xref target="ex-controller-ucl"/> illustrates the configuration of an SDN controller
   using the group-based ACL:</t>
        <figure anchor="ex-controller-ucl">
          <name>Example of UCL Configuration</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>
<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list"
      xmlns:uacl="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
    <endpoint-groups
      xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
      <endpoint-group>
        <group-id>R&amp;D</group-id>
        <group-type>user-group</group-type>
      </endpoint-group>
      <endpoint-group>
        <group-id>R&amp;D BYOD</group-id>
        <group-type>user-group</group-type>
      </endpoint-group>
      <endpoint-group>
        <group-id>finance server</group-id>
        <group-type>device-group</group-type>
      </endpoint-group>
    </endpoint-groups>
    <acl>
    <name>sample-group-acl</name>
    <type>uacl:group-acl-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>R&amp;D</destination-group-id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence>
            <recurrence-first>
              <start-time>2026-01-01T08:00:00Z</start-time>
              <duration>PT10:00:00</duration>
            </recurrence-first>
            <frequency>schedule:daily</frequency>
            <byday>
              <weekday>monday</weekday>
            </byday>
            <byday>
              <weekday>tuesday</weekday>
            </byday>
            <byday>
              <weekday>wednesday</weekday>
            </byday>
            <byday>
              <weekday>thursday</weekday>
            </byday>
            <byday>
              <weekday>friday</weekday>
            </byday>
          </recurrence>
        </effective-schedule>
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>finance server</destination-group-\
                                                                  id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period>
            <period-start>2026-01-20T08:30:00-08:00</period-start>
            <period-end>2026-12-31T18:00:00-08:00</period-end>
          </period>
        </effective-schedule>
      </ace>
    </aces>
  </acl>
</acls>


]]></artwork>
        </figure>
      </section>
      <section anchor="PEP-ucl">
        <name>Configuring a PEP Using Group-based ACL</name>
        <t>This section illustrates an example to configure a PEP  using
   the group-based ACL.</t>
        <t>The PEP which enforces group-based ACL may acquire group identities
   from the AAA server if working as a NAS authenticating both the
   source endpoint and the destination endpoint users. Another case for
   a PEP enforcing a group-based ACL is to obtain the group identity of
   the source endpoint directly from the packet field
   <xref target="I-D.smith-vxlan-group-policy"/>.</t>
        <t>Assume the mapping between device group ID and IP addresses is
   predefined or acquired via device authentication. <xref target="ex-PEP-ucl"/>
   shows the ACL configuration delivered from the controller to the PEP. This
   example is consistent with the example presented in <xref target="controller-ucl"/>.</t>
        <t>The examples in this section do not intend to be exhaustive. In particular, explicit
   IP addresses ("destination-ipv4-network" or "destination-ipv6-network") are provided only for one single rule to illustrate
   how the mapping between a group ID and IP addresses is translated into an ACL rule entry.</t>
        <figure anchor="ex-PEP-ucl">
          <name>Example of PEP Configuration</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>

<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list"
      xmlns:uacl="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
  <endpoint-groups
      xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
    <endpoint-group>
      <group-id>R&amp;D</group-id>
      <group-type>user-group</group-type>
    </endpoint-group>
    <endpoint-group>
      <group-id>R&amp;D BYOD</group-id>
      <group-type>user-group</group-type>
    </endpoint-group>
  </endpoint-groups>
  <acl>
    <name>sample-ucl-ipv4</name>
    <type>uacl:mixed-ipv4-group-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>R&amp;D</destination-group-id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence>
            <recurrence-first>
              <start-time>2026-01-01T08:00:00Z</start-time>
              <duration>PT10:00:00</duration>
            </recurrence-first>
            <frequency>schedule:daily</frequency>
            <byday>
              <weekday>monday</weekday>
            </byday>
            <byday>
              <weekday>tuesday</weekday>
            </byday>
            <byday>
              <weekday>wednesday</weekday>
            </byday>
            <byday>
              <weekday>thursday</weekday>
            </byday>
            <byday>
              <weekday>friday</weekday>
            </byday>
          </recurrence>
        </effective-schedule>
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
          </endpoint-group>
          <ipv4>
            <destination-ipv4-network>203.0.113.1/24</destination-\
                                                        ipv4-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period>
            <period-start>2026-01-20T08:30:00-08:00</period-start>
            <period-end>2026-12-31T18:00:00-08:00</period-end>
          </period>
        </effective-schedule>
      </ace>
    </aces>
  </acl>
</acls>


]]></artwork>
        </figure>
        <t><xref target="ex-PEP-ucl-ipv6"/> shows an example of the same policy but with a destination IPv6 prefix.</t>
        <figure anchor="ex-PEP-ucl-ipv6">
          <name>Example of PEP Configuration (ipv6)</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>

<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list"
      xmlns:uacl="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
  <endpoint-groups
      xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
    <endpoint-group>
      <group-id>R&amp;D</group-id>
      <group-type>user-group</group-type>
    </endpoint-group>
    <endpoint-group>
      <group-id>R&amp;D BYOD</group-id>
      <group-type>user-group</group-type>
    </endpoint-group>
  </endpoint-groups>
  <acl>
    <name>sample-ucl-ipv6</name>
    <type>uacl:mixed-ipv6-group-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
            <destination-group-id>R&amp;D</destination-group-id>
          </endpoint-group>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence>
            <recurrence-first>
              <start-time>2026-01-01T08:00:00Z</start-time>
              <duration>PT10:00:00</duration>
            </recurrence-first>
            <frequency>schedule:daily</frequency>
            <byday>
              <weekday>monday</weekday>
            </byday>
            <byday>
              <weekday>tuesday</weekday>
            </byday>
            <byday>
              <weekday>wednesday</weekday>
            </byday>
            <byday>
              <weekday>thursday</weekday>
            </byday>
            <byday>
              <weekday>friday</weekday>
            </byday>
          </recurrence>
        </effective-schedule>
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <endpoint-group
            xmlns="urn:ietf:params:xml:ns:yang:ietf-ucl-acl">
            <source-group-id>R&amp;D BYOD</source-group-id>
          </endpoint-group>
          <ipv4>
            <destination-ipv6-network>2001:db8:1234::/64</\
                                            destination-ipv6-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period>
            <period-start>2026-01-20T08:30:00-08:00</period-start>
            <period-end>2026-12-31T18:00:00-08:00</period-end>
          </period>
        </effective-schedule>
      </ace>
    </aces>
  </acl>
</acls>


]]></artwork>
        </figure>
      </section>
      <section anchor="PEP-acl">
        <name>Configuring PEPs Using Address-based ACLs</name>
        <t>The section describes an example of configuring a PEP using
   IP address based ACL. IP address based access control policies could
   be applied to the PEP that may not understand the group information,
   e.g., firewall.</t>
        <t>Assume an employee in the R&amp;D department accesses the network
   wirelessly from a non-corporate laptop.
   The SDN controller associates the user group to which the employee
   belongs with the user address according to step 1 to 4 in <xref target="overview"/>.</t>
        <t>Assume the mapping between device group ID and IP addresses is
   predefined or acquired via device authentication. <xref target="ex-PEP-acl"/>
   shows an IPv4 address based ACL configuration delivered from
   the controller to the PEP. This example is consistent with the example
   presented in <xref target="controller-ucl"/>.</t>
        <figure anchor="ex-PEP-acl">
          <name>Example of PEP Configuration</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>
<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list">
  <acl>
    <name>sample-acl-ipv4</name>
    <type>ipv4-acl-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <ipv4>
            <destination-ipv4-network>192.168.2.1/24</destination-\
                                                        ipv4-network>
            <source-ipv4-network>192.168.1.1/24</source-ipv4-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence>
            <recurrence-first>
              <start-time>2026-01-01T08:00:00Z</start-time>
              <duration>PT10:00:00</duration>
            </recurrence-first>
            <frequency>schedule:daily</frequency>
            <byday>
              <weekday>monday</weekday>
            </byday>
            <byday>
              <weekday>tuesday</weekday>
            </byday>
            <byday>
              <weekday>wednesday</weekday>
            </byday>
            <byday>
              <weekday>thursday</weekday>
            </byday>
            <byday>
              <weekday>friday</weekday>
            </byday>
          </recurrence>
        </effective-schedule>        
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <ipv4>
            <destination-ipv4-network>203.0.113.1/24</destination-\
                                                        ipv4-network>
            <source-ipv4-network>192.168.1.1/24</source-ipv4-network>
          </ipv4>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period>
            <period-start>2026-01-20T08:30:00-08:00</period-start>
            <period-end>2026-12-31T18:00:00-08:00</period-end>
          </period>
        </effective-schedule>      
      </ace>
    </aces>
  </acl>
</acls>


]]></artwork>
        </figure>
        <t><xref target="ex-PEP-acl-ipv6"/> shows an example of the same policy but with a destination IPv6 prefix.</t>
        <figure anchor="ex-PEP-acl-ipv6">
          <name>Example of PEP Configuration (IPv6)</name>
          <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

<?xml version="1.0" encoding="utf-8"?>
<acls xmlns="urn:ietf:params:xml:ns:yang:ietf-access-control-list">
  <acl>
    <name>sample-acl-ipv6</name>
    <type>ipv6-acl-type</type>
    <aces>
      <ace>
        <name>rule1</name>
        <matches>
          <ipv6>
            <destination-ipv6-network>2001:db8::1/64</destination-\
                                                        ipv6-network>
            <source-ipv6-network>2001:db8::2:1/64</source-ipv6-\
                                                             network>
          </ipv6>
        </matches>
        <actions>
          <forwarding>accept</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                             ucl-acl"
          xmlns:schedule="urn:ietf:params:xml:ns:yang:ietf-schedule">
          <recurrence>
            <recurrence-first>
              <start-time>2026-01-01T08:00:00Z</start-time>
              <duration>PT10:00:00</duration>
            </recurrence-first>
            <frequency>schedule:daily</frequency>
            <byday>
              <weekday>monday</weekday>
            </byday>
            <byday>
              <weekday>tuesday</weekday>
            </byday>
            <byday>
              <weekday>wednesday</weekday>
            </byday>
            <byday>
              <weekday>thursday</weekday>
            </byday>
            <byday>
              <weekday>friday</weekday>
            </byday>
          </recurrence>
        </effective-schedule>
      </ace>
      <ace>
        <name>rule2</name>
        <matches>
          <ipv6>
            <destination-ipv6-network>2001:db8:1234::/64</\
                                            destination-ipv6-network>
            <source-ipv6-network>2001:db8::2:1/64</source-ipv6-\
                                                             network>
          </ipv6>
        </matches>
        <actions>
          <forwarding>reject</forwarding>
        </actions>
        <effective-schedule xmlns="urn:ietf:params:xml:ns:yang:ietf-\
                                                            ucl-acl">
          <period>
            <period-start>2026-01-20T08:30:00-08:00</period-start>
            <period-end>2026-12-31T18:00:00-08:00</period-end>
          </period>
        </effective-schedule>
      </ace>
    </aces>      
  </acl>
</acls>
]]></artwork>
        </figure>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This work has benefited from the discussions of User-group-based
   Security Policy over the years.  In particular, <xref target="I-D.you-i2nsf-user-group-based-policy"/>
   and <xref target="I-D.yizhou-anima-ip-to-access-control-groups"/> provided mechanisms to
   establish a mapping between the IP address/prefix of users and access
   control group IDs.</t>
      <t>Jianjie You, Myo Zarny, Christian Jacquenet, Mohamed Boucadair, and
   Yizhou Li contributed to an earlier version of <xref target="I-D.you-i2nsf-user-group-based-policy"/>.
   We would like to thank the authors of that Internet-Draft on modern network access
   control mechanisms for material that assisted in thinking about this document.</t>
      <t>Thanks to Joe Clarke, Bill Fenner, Benoît Claise, Rob Wilton, David Somers-Harris,
   Alan Dekok, Heikki Vatiainen, Wen Xiang, Wei Wang, Hongwei Li, and Jensen Zhang for
   their review and comments.</t>
      <t>Thanks to Dhruv Dhody for the OPSDIR review.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+196XobR5LgfzxFLvR9I6INgIcoSqZlqSmRttmjgyNK9rhn
5kcBSBA1KlSh6yCFlrTPsk+wD7H7YhtnZlahQIK23O3uFWfaIqsqMyMjIyPj
yojBYNAp4zKxh6Z7ZH4+evm9OY7KyLzIJjYxUToxr4+OT9+em5P3pU2LOEvN
NMvNWZbE4+VgFBV2Yl7a8irL35mj8dgWhXmWpWWeJd1ONBrl9pI63uj7cVTa
iyxfHpqinHQ6k2ycRnMAbJJH03IQ23I6yBZFdHUxqMbJIIL/7XzdKarRPC4Q
sHK5gI9PT95810mr+cjmh50J9HjYGWdpAbBXxaEp88p2AKR7nSi3EYD2amHz
qITWBU32RZRGF3Zu07LbQRgv8qxa4Gdn50c/fd/tvLNLeDw57JiBOXr2HP8J
p4Z/P/351TG95tmNeXadTlSVsyzHlh0DP9MqSXh6/xZX0yi9gLHpRZZfRGn8
VwLq0PxQRVc2phfQC3xtJ3GZ5fSgKHNry0Ozu7NrzrNpeQVzMkeXNq1s3/xc
zarIHMfwUTwu6ftxXAJu/xTDYEXFT2CVD83e7s7O7p48qABc+OrZLE4ZHjuP
4uTQzKO/MJy7f5wRTMNxNm+bTGp+qq6fyN8U7lGcJMOr6lqgX2Qz+HdinmbV
OJpEcd4C/6schrftC8EAvrZpaosAvnv3d3Z26uB9B72MbQ2vPPZwpGP/MaOR
2iE9BohgX/5rnF60wPgcOo+K0ubmbRpf2rwAuOrjw/MSJortJ9i/h2MyfAcP
/5hoF8NoPKzedTppls+h+0vYR504nQZ/GWENgzew8YpD6swILxGmQW/4hSN/
/hnoL805dE+PXh51pbMov0BCmZXl4nB7++rqaghEEA2hxXYEe/4ixZ1abOfR
JK6KQelHo41vplFS2E5nMBiYaAQEFQFB4fs3s7gwwF4qbG4mdhrDwpmI2d8E
2d+c2B9yukXIuVLhXBHt7Q5hlrZ331zN4vHMLPLsMp5Y2vYF0DD2j3zFTqfx
OMa/LOJwTCzGZFPsot6p9sgDx9AVDw2Ml5iRge5TwPJyaIBuc5vBOvdNuWZG
czueAXKLuSkzY6Ej+NLCXo5TAE1JMZvK08UCSMCMAB5rU2hdFUBK4ajTGB7g
fCJTWITfnJ5tvzh6ZqLJJAfgGf04FM/yOuzpRIe0JKcp9hEjDfQJmpbJvLbz
rAROAZSEwIyJYoBVRMkgTrGTtwjvuc0vYxh6i2mwZ6ISWMmoKnHuUWkAURVC
U2a8fvN5lWJfjJo1Uy7MIsppwvpURgdkdBx1CxEbt0+ydMjkN48nkwRI8Q5M
FCY9qcb04Yc7Mf75iVDwU1zOCIY4HeeWMBZNsgV9CAPnPHtBXgkLm2ZJdoEU
smWHF8M+9vFjnJdVlJizPL7EKclRC5/8ePay6PVo8Z7muMw/Z1VuXl0BAi3j
Cw+uHnailNeHZQROsMjjAvGPsABMcyA6M03s+xhYK9AhAJZEJSHUzLIr3Ak2
twQNDgZ/pcBjFkm2tNALEwA8H2dJEo2A15UWKPmH7MoSITd7lzXClogejxoA
6l0BLU/SaJTgfDLcYnXIPF7mmTyKxnkG6JtH6VJRmWS8lkXPxLI4RG5C4bCB
ksQCRybaRpaQIFsaFOMosTUMAZxAJYwJIO5LJJQshdVoEP7cCRkGtlyeReOZ
LYbY+8n7CDAFXcG4RQX8xA9u8JBMkKVMYIcm2RVxYPMHxMBkkQHkyABMmpVm
Fl1aOGQBLxb2p9+bgK3vAHzLg/SB4GDphI/Bz/Ojl2brJ/gvUwkQjBknyLOA
EGADXNkkwX9H0fjdwOIHQmsvAH7YodLL1o8verLfYSvhIdQ34yiFFbi03yB5
x3kNKDybkglOFGaJ/UfSEbyuknIo3HpuIxDRaAMD0Eta8BS5D3D1tFhksDlh
pyYT3Qw4knR0f1BWMN8e7nwQDib2LxXtduRSRQVYXcurCzuucj1DZV8sQw4O
0Pm5yKwd355HS1qOkRJlohDZNKsuZggBUAQwoAyPK3iq60ikfpnBtoqbS6iL
7pjFHA9CWO+QVZSwrEhwgCVCBMwxRopOreN7uDsXi2RpJvF0Ch8Es/UzAABx
iAJED90NyB+BgaYTm0s3voNxnAPPBsJLx44pwYlocSMQl6BlA3YMFATgXMAp
VJRuvXEbJvx2RnuDkKEw+H2mu6nXIGfpprnX4osZLcEF0AntHVqkagGYGsNs
bR5HvNWigid3V9FT5w59UwDDHLvhYUKLqpRX3JAEQ0B4PLeDbKoSziRawjMQ
TRB92njCPJcOIkHUOMsXxA5hrYoKnvM30gtupApOIfiHWAq/7PXll7tFuHxF
CWQN3LscD2n3SB/BHkKUKixIFbTWuR1nFyCJ+ZMQ5qTiBm0N2r7SG4zGqw7H
uH1f9ukDkCF8Y1k72PAwN+i8DOQm+KEV0fUVYIa3ks+2PnyAWQ/ePnv+6VPv
JmnNiWo4AktrFnVanDsAgHpjQyM1z4ErACGDogdnAwxZwW5kaCbAScyHD//j
9XfPHt7f/frTp6GDW75DnjeyKmq0sJq6IIjapNt42JeT+hC4huQnSLLUCLoc
2wVyfeDNKLdd2BR02gTWkUYeWaGRQQqDL+wYhRdeLYYRO9NZAWkI1rajyTxO
UQ0jeR+WA6VGk8BuTmDmT04Hx0NSyeF7mDKp41ZtBAUgxLwhRgPnV3ZFaxPh
+QE8R0SnQmZdsLxHayu4W7eS2B9OubYGjgIARKAS5LhJPI9LFEYM/BMsRBt1
gYqQrRWY6RCNixm+aEjHW7s9PWPaZcat02M+SLf2eiRm0nkFcuT4HbDSmYWD
KNczCz/LkFF36HQYRws4+wBLMJ58T1QvnCIQuHsE5nvY+iK/1tDWJmgfiZQN
q7H83JI2b4i9hwf3YTX+rmK3sgbWDIE7yOQT+J6O3nDeoL7DrGtqDAkiqZ4t
SGhFRocgye2FEy887pT25tE7FGOKar4QsxJo9qUwHD83lueUOwCmLi5gwrgd
hJNYOOmsioPFjIQkkSaIiQD14AoXxLXnAMOEd9UQFg9JyzXiDR6RkYVWAiYq
9IHD6f4YLRcANR6QSxBXqmJGIlbFR0WAGwLvFdKqiefBZg60AGwh8hysXAOv
AMUkLsYVjcXEBNwEyObrB18/QD6qvG0Vtcy8lrSxYRg9a0Qsa1KPqqITOyE6
mzQERPM9NXhKmGAjntn6/ulZrwYfAHfOi24OhnvDezgjgvbg3kMmqzt3zAmZ
gmB3mJe4bbbeENdFhe2SEQoN5KMezY8+E0z5d4fMmoTIcMeUtY5A/AHGCM8W
1UgR38bScL+jbGUWSTS2syxBTnMZJZWV01/kQO6bPpqwzAn7nw8O7FRaiLSA
Ug1OPhxbBk5xNkDw8wi2IrYARs82BeymqEYFnFoVkwmNj0SAMABHRlww6wsQ
YVAwzFlHZpKRc4sBs0lhr1iqTeuWD8bGWUKWDpZvEfZphocQErRMl8xGqkD9
O/yYweAxfcpmJcAHQsNmZDqOasNwu3P4ubEdsMTmSVmAuofH3GAJW+TTJ+5s
b2fv/mDn3mB313c5JvWKdAMx0QTI50chUJ07KLiI1slnyjFydGL3RaeDm+qd
XaIKDrug++Lt+Ztun/81L1/R769P/u3t6euTY/z9/Iej58/dLx354vyHV2+f
H/vffMtnr168OHl5zI3hqak96nRfHP3cZbGj++rszemrl0fPuysLSIvNlBmz
xG9LYnOdiS1AXh/xpnz67Oz//K/dfT1wdlECU3Fs98E+/IFmBx4tS4EK+E9A
4bIDZGEjJDGiUzhq4xJkAFJxgWNepQYpCwjpD/+BmPmvQ/NoNF7s7j+WBzjh
2kPFWe0h4Wz1yUpjRmLLo5ZhHDZrzxuYrsN79HPtb8V78PDRkwTOfDPYffjk
ccfxXtQUYLsUSnfFcj7KkoKWK7fIwSOQ3ufCzp005pn5w3v7O63MvCps0diT
E0ekzG+x/b3dr4G96g5lDn/LzngHoL0nXQKka+R2HaIh+Z+guRwl/5Ne+weo
GpBm0HNgbQCEP/NnOcohfL4G9K/gvPXyEB/V9XFB3u2xDkQG9UNz9Ets1856
zVxZeaxIPuruk2OqSyyMGw+k3QDtUV0ZcEUbMua0ZPG/aDGdXKfgqDU9EN25
wxGcFKahvooqzYoJYbv2/jo9Rq0pakETZOZ2KtorIiKdDFA67YPYUZQyWt+g
PuN1GTnWiGEDtwH0pHCIcxdetaUpHPku8YR3iheK3azdD2E1g7FCn8J8AfJ0
H7bnPMuXYvEo4MCM0HSWujVGGgTGFpHNkxd0UgMqxB8e/EiHaBFlqJDxyjEy
ND94SArGDHbgTHun2ZtAfXEfAh91a7ZsGHCGiIMQeWSbKtQRCNNF3sL7hPRG
pcwxDQv9o9RlzDnL5m8LmD1L92Iaz1hYT53tmwW+VRMSqE+5/UsV52Tr6pDR
cb0JJCYxFMTOEj1sganb27npgOF9hbhuohrGIRtSQZKTnEjuLcizhQpNW9ID
rGSvaUwRra6u++Ro58J+z9GWxX+R3B8waM+g2Nam5gZodVQ0pV52THwiIhvZ
cQRAqM6r5kSyg6uw42yDqvKK+witoGSQdnZCEgrZllYzBMOw3paoSCnsBQlr
fbZSoBuBjIjXes2WRDc2Akz4EQw7axsd80xAG78kwehdkkUolCKFJrDMKQpf
aqRniVzWdxpfoEFHjbbMwWiVxgkKg9NlgI+A9GSHqHsEPs3GMY5CyhhJ4c0+
i4z5izcQA6pwdh2yoiHnRE5ZzHCxI3kiJqUcBM1CBXU3kYvcRmWCrhtydpCm
BJSoCNBjP2CdmcwEjcxzkvJLsT95onYnoeI41C+Ji+GBwkxfGUVV4HLqBidX
jVpggLuoYTY8WwxJ1TfbnwiaY0dQdbO8V4CIETHRB5Zstmmi+F2A6iKaNXZY
c6CQwyfVTgERFLNgtrKcjZu9wPEVeeYUTJZ4LdpzqVv53WHUTCpy1REygUnn
hRovE+T3zHKF4mPvoZNW2XQ6oEbMn6x9h8ZOJO6a1zlcY5oHWcSEL4a+XPhk
Skx4Fi0k/mDLa8egG+P/qX68t//gPhplcWhG/ZoW+80WAj0I6TJnXBpQWWCq
aATAIxWWCdAsJw6IPMRR+Ggo+GzYIN6INHfz6hLb2Svz4U4mv7I3FjlAPp7F
JQxFG11MQQAtHEjLorRz3pXueIY9lQxITZbjViy9bNOrGXvXufpj1UGIBeP4
ZEilvRsAw5QzTqrJivw7rdKxeB3doYXgEKFNQfV1ai9IGYIzwC56IIUERPTK
AOUxsj8eAZGD+pI0UW8LQ0FbuOk94jPOjYGUxbYrOtcu8dNMfQkoe/By+m3i
dwGhWdgICkYoLiErot1K9pWo7j+gyWlk0eBYjr+XXjjaOj9+2RNV48HuPmuP
9Mf+3gH8IQuTWEWH86EAVAtc2ZGYqSmUAv6HvSp/HoSCO/FAcY2QAdk7Jhvf
i7DgToSJN6EWddsmyzP10IueyJdIuDC7cAq0oUcWT2E2bKq56xgYEcn4Z3Tc
bJ0dn/VqCphbHtjEVTETWhDe0LQv1/yG6Fm+RP8ODyUdnQTb4IyPsq2zk7Oi
PiqyKAOwEE9D2N+luCciXYOusDwWQrvSdu/B/XvK9lvRgBRI2wDkdD5ogaTq
Jm4l66OabIXTB96BMVREPEdHRw7g+/eQeBgSUgqa3OacX229PDp3FHd/f08h
JVK9rol435gM4WCcoD04qkHtSPMvFexi3XjQ2k238PM9OlJoKUoBeVrJkq4u
dt3ozwc0MLkyG6MJIInfWQ3vCu39Q/MTSsBCErBy4nBlGReGle5lcMc1m9of
+074CXpQAEqeuwrk0g/GQKCFQuVuljancQ7qSpKh6SJtuBYB0SkweoHd7S3l
ZMWqW0m9B94CuKjyRVZYt3ZveG4rs4oovkUOOmT4dTKrC+/9YJtFns6UlRfD
5jBxscKHxtC7Ov0CLIVsw4edtHW4QNVHpFqxBgf9jOEhwg/bUdkP4RujEpk9
ANtCw2Kvj/5nhqum1Mcamkefq7eAOgnY3BbLzHJYTGLEJh1eWV1/UME3iI7z
0luj015ttYT1rXAiYkQUI0LuC0an7D4ZUY+CFeTz6U56CUrYIOhHPlJLA4C5
D386HgmxslJDgBQwbJTHGfuP5OSThgjVCkNbhPvn9FiPEMWueB3ZhSj9iOMR
F2FiE4oSbZwk/uBqRoIEjIb4P7JuUpZU+V+dCQvGIkviOY5tyHUDokM29x5O
r+AqmfhzULRFgHk7w2GKEiUTpOnGEXp6XPRlG0GHGOQRYG/l27aJCnFHqzxJ
BZgoz0VfqLlyC6esNN1bxtzkRKJATpgXCBIJGwmFkagujlwa8TpQ1x9rJMFx
96JKyhjlU8Hvkk3ol1lyyb00RCRDZ+zJGci1yNA0ukIkZictKj5enrx59url
d8LxD/b2d1FUZwtZnSq5exVe63xehciaYE3cI8/GoIrmtJ06uk3a3dghH+t0
/if8mCgqLi9kVhv8DAfBz3Dzdh9fBXLyx83b3eWRvqL/aniR857fPCyIq6Vd
mN2eNB1s/NOr/aUjq7hx88g3z5Eg219toTgemsYDeeL+/GplIT6S8fvOLrz5
ShBAZxX9Qv9Finvm+aAfVTA9uBt8yyccD8P9kWx5zRQ/+r6+4s6Crj3Ad9c2
bf5682ArLb5qDPaVoPq+74L+3mt2QU/vtQFwi9Fv1XTooQwhbv27bbeFc9z4
51rS/Fjf4sHwzRfDayiWOvrYLpzDi+/gSLsCbsZxdh99R0K/ezWsOHSxVB+M
cLcO0d1Wal7//aDlo81w1PqDR8LtOloDTzuQxK87Hw7NHTwD+LbIt90jteUf
hQcDSlYUoyHHgEhuwRUtOEhobQYg+F6k33bHZGftftIbBeSusOmYzFh6JPUb
FpNyuYjRGj7FODUQ7uBAtHDCQ6sJm0qY+YpvyBzVbaJb7KBoMaT0Aisxn5Iq
SwfGBRSz5VwesAeL7AWsdDXD4kQ/caJ9GPxGThUXrlQ0BAg/JF6dU7GBGYhO
jNW3G9Uo9qKjkNKUBsWe6jUdH9vK81mjMai8x2472B4BdPcUOhTdG5qp6Lsi
sqccYewjkLx6IwMwEJHTZZ3A1qrNnrJrgATxiQuaVdHJq04u7DIQ/dkFqLoU
mnzLLBcNNdCkVO9r6FN9h5q+SqFei+sHzraGnqO8tRE9q9FTzjx9Rb7KOi7n
FvTRiQbpDRtULh2zLM8ewL5A7SXbB2LKdYZ50J7t+3IAWgGolhTM6BRq6ZC8
e62ANIPapMGp+CXaCQHWc4yxzH1vD4glCIpFYEcIzrl+5e7caJhzboH5pJ6M
gB6dQtI+OF5TMFuFtWYl5vA6qKco7NdBxWVygUTqjw3VXXWMk1WsEc5NnSA1
pplIzN8YMlvUzCZM0zICuyKA9wXIAJpecgCtl7yBIcod2yJYudB3uUVmRbVY
qP8ocDMuQcthU2juzZ+kgk+cf2tKoQLTPBPLeuC707DBKJ84BoisF+PlBwJt
T13NdYc7HgTkD3ZaVORjOMOdLBZm1H0ucuJeajRr03BY8FX2dBLTjmz0KEhC
SxwsrYutqHcnUK65hNcIjgWlNTSfXKfgB0aVdnsx8VQ4MsalUz0BCAyuJMbI
EHsX/Ry6pXXQoNBinC2sC0NTr1YQlcgCawNF4p3M240OayzKugNz6wzubPTx
ZmZUe+laSoul5G5RUxq5Mzjv3JqRIszkGFpU1kGJFgPnEaiTlcPD0DzFYBW6
k1qL718SH7XvMZCnZp8AIIbAQuAfPqRppfnviP62emEOZ07e7XFEtkh0ZGkM
C4tM+OyOhGnLA8OHaBhpjSbPEvd2qm4UueWzwEOKjaECs96VIR8e09OKDx+O
K5vpfRlyzPVd2Cjdgsk0QMSMbS7UZZlNnko0F2yP0A5cI/0eOxYAuAJPNrLT
iZX1MuDgfKs28IOTTXFIyHCmEY6oDc2KAWYKE0+9LQqN5FkRo0XP7SmMJrmM
84wuIPfVMsX8LnD2K/IoGFpC0B23r0lKciGDQwdi66KYPDfpu6B35d8UXeSh
HmrndwuZ+9xiaEYxixc0bXfHjntZUDSQ8B2WTRjOhpc7nja4EHvpXdd1Miqy
BOUfYcUtNEKyGtHRBSxbWocY+NtVjGGZDGrduI9r5mKqrohq/AnBJwjoYwUy
KDSS6dRyjUT3oSY+Ohmvp8VZVYR4bLuDVA/vx8ujLsRfIvyRcYYkJAed7CON
zKkb8CQ8x5tNNdCJbJjCa5meiduGN2XxEzyGAV0VR7fhScD+iQIFs+piIGuI
HioAT4JOQld2Heha4KLaO2cRepAshnZPeBN1jLO+40ccd1JYMu7pkaT8gpxR
dP2j36Agd/uOosERtZWEz9n3Y5gSEEeTEn20f60D2eIK0+t/OTav7UWVRGzm
xr/xbnMAbCm3GjlwILjYSFTEriUXnw/NwxQFjHlmGxxczGZeCpKXa35yb9Zs
gSI1H8h9Pn14CbxIIsv0Oh9Nh1/jtcbn8Tt7Bfyj7wD1sVQjW2MAdfYVrAxQ
FYjPck82DOAHTqyCiYKLj/xdaYwUgSeF3jnUyJEeWzo6nY9ydeIlAqZ/wM7V
X48pVJv3xkf4GjEoPx9JdswGuzv4K77wETLNH21Kaxc03cVfz+oXIWlL17vD
5udRoh1r8z0amV+sGxub/njqbYTS9B41xRfXAY3GDb/1xMRx15/Eesn77ic5
pOX+ff2YlnPSccW4eTTKVWg5DIvGaUgRIv5ADE/D4Hiyqd4yZTfOapwan398
jUjsHDo2RmIUjQt9uQ/jpG/Ew8TbjONzOKLIDSNnM57/PI4EK3DorfvsNHvD
zJSwwuHKCAuFIYqyIrxPNVNU9MmPIcG5FIiMnbhwSlAn0j5/RXu6QHxQOpQC
BbHJCv8MmGeHRXbkn7WlupGD0grfbgdRg59AoyETFdPjKMoH+ztKnv6lRs1o
hK4x2gGzRXmrXdzXLvDtSltueSZo1Mba9kDb6gc+Yoca4kaYrGyEkNrDrWCM
CGisApCppoUg/a02w+YMtrWwoD8hUfJFVI7p9prmfFndTGlRWg5zdBeLaoGo
JKipwA5PZjbBOMwZXiCTnZYWaHVIhfWoFCJyi2emPlvCi1pWBLyYzmc23yG7
Y46CiGjPCxqh0k5wXwkwCPch7w8JB5UDeY1mNWSZVDBEFp4qhaNYvIlht+HB
V4+opDv2PqaSxAwJq9SgphC8yLEd9ILjUtdHqoVoIjisJjmghGVt//ii2Ja7
bhSLTgPJmq+iRXCHV8MKL/1lhJXGl25thuvkDy8Q8jnrDlmXjSIMoNuKhxY4
kiaiGIqH9Dr+osxldQK/GYc5qiZxtv0jHBsZqO65jcg7L6zir4MHO8xrws/Q
ykkWdol9cKBKl6cpZoMA0Q6QHF3gR9rbQ+7thXvR0jq40Ki5Yugt9/D1DvEt
F3TpvsbEXK09ktthhSGt7LvaAU2H8VtgBSfNCzHIH16QYZ4VcPnDRZR6LULM
97/mfg22r12w4Z59L8CA6HBbFzsepY1XoSwhlq85Mk5JjiFhFHAYc6+UTKY9
1h532yXjzwfjUAAMZozApYEGfOm80OgATOCHN8maEQJ0u4zvfqLfRDQ4xo0k
/VN8iPO/w38dmvAbHCWqOMB/G/4+hP9JhrKvBoP8qhELUpgPFX5Ff3x6ot6u
tk//YP6D/h3Ek/8KvGL8qb7hZ3g+pRdrPkLR+0kgpOV22gaz/iL/Wn1g6V9e
sGsmJvOi7wZZOmidIB/aAwX+iYKrDwbOjVZvF8Th1Bq3ttt8ZrXZUKQ3iJDu
0qzMSP9szmXLXa5FBPee1LF/uIWuvcy5nER64qb8qv7G1F8OJp5rPmlf45ZG
wALhPAh+8N7vIe6QAewQYl5rOqBMMn/NUjvwmxXHLZbFIb6jV2m0tr1MdxUX
zvlLSLHvkQPGZa/tiwZ+UJZRCtlgHjrEpBJhp+0LB69+5UjQPWmuY245/czY
hj26jvxr80Ep4hC9vOhRygf+9acn9eYtPQzIGbrymcMLLS/N/kntg2ux0+hj
deJrp99o+UtIJJxngElc2t4qPj4KyjEqNem1vXbA0CeNOWyMhsMtinxtHcGB
S580RqiA3d3bu3kdG5t3ZeuGzaY5S/fL5usGw25ry/cnoyYiboKU9xecLyHb
+K/1K78xS2pvdzuu1Ojjl1Pdxxt5k/vOXMOewo9+KYdaGaiNSYUfmVvxqbDB
aFlgdDWsbvPnWpIYLUEEr0p762Z4b2q10Y3NJtES6E/sf9eQ3iTOWfPEMdq7
dN9Kb/zU8WJ5un7eIGLOCJz6z/XwL22UtzTaoBXCc/uxCMpGsxtQXNhykRWr
a3NdK3RmI4C8Z0O2siE+7XvMEIZyGu6FcPSWDeIitFRG1yitmhZ0fewVpUOg
GCLN37RWjFfJkOX/Lr1BtYdTg9B+vZ1q5Lz23YaQ3zXOWIC9zqJLjgei0QDE
bl1BwuQk6Krps6vVUkaIGcU5dFXE7bJyVaUxnBbJ0ltdSc0Lg85F6eLcuV2v
A3QRQ8AoS7lXLymOWpri16DzPA5HbyYQYN6PURHs2QYsVKk4CyiuAX2qEm5E
FNdrJqH0zqhCYk00ep9jKOppuGbA9zGqbklIpyhzzq8wZG9XFHwhSTxLl4nY
WUiwJ22fmtZ8DRSsgN5/Tec4JjMOZwHSQX0mwzLy1wpciI+gEaPXnIeHgyDg
c7JBOKOOGp/mcZ6zAYgMjUShqj13XfauRbbAbG1hAjbMm3AVfE+rJatDsRSL
hTeO6fCZ5IMT0m+kisM73z4zHEYa6B2L2Ls8V+MyXGokc8QbzZvY6qnEZNBp
RZo3XQ5DO2V9zLr70t/45uPt1rtdFNhgZ/7ybe8sHRtcF3FxdRP7nlwcbABx
CutEg70IQO/MdPMF1Ob16a7hZrbGza6ZE1k413GzujnFeYkd62CvOGVaPHp2
Elhh2TTj0p5mtEPhwXbdLgPb4CrzsSr0kt3mQf6IIHFmbjEdRNcL111O7MQS
WJfRSwmEgjt1fv56bNGkwwhXTs5zQ8KsPt2/YrtAspTwlzerFEcdi1Huwx2N
lF0xy8VztNcWMnucxqbQSw9s0boJ6iFnwwEqrZPIjUQe3JjfH+7i8njq6KkR
7NGzV8cn5unJ96cvzx8DF0ka2Pijzy82RHi6HZ198JH50GGJYEC1A2DA3eHu
N/AMJfligdeBulWeHmKbQ6K94vD9PDlMi0OSI2rox3YL2FDxe4MWm28Q74xq
s27KNL5rRY3w76b5qYsp1nD+hyv1SjAeoh6vvyIRtSZ3JWg/NSD0JqcQLH16
DWyYGA5TMj1jz0sbkOfcCxCZDN2p10Gg7rqUk/bV2flP35OHD88IslBTG2KZ
UiGji1/Y0aF5hKUSisPtbYy+QkfIO5sTVVLNhKuLbS6gsv2Y4YVmiAZoh17P
Mjvk13/UFo/lrpjmJzTNYiXBj3bRWihExuN71dyPqxPS0sdq0Y7HTUDaa3a0
wXNNgY0VsJr1NVr6ay+U8ZjWJFDGeV3Ie7BBLq+QCSp/YACQSRAdNIzvSUtu
Ykr04MUs7uBWmYfdOSGzb97O1uTDuI0WS0ozZLbGPUpfyGC+yaui1GTREuBS
eKlYDKyR5i9yAWhYMgVklCSR5EXI5NFTOtEBX9sJFYUZVe5SPh5ClJpVz3sz
gpM+p/Q/mD4Gz05unOUuzxXgygmwfQoQx9C1UiIIiopx56LtKIHlfwfJnNAj
nGIhDWhWOMEFzwh2EL62l7FLWPb0/BiWmRtgoBEARlUMjGfpY8WAR99dWfvn
9oJqOUjmnAL6lqzAAAt9fizSnTTY0u1fYjfW+q0vUA/wKkFPUUrYtto5VvMg
QgM8YhEWzjZZzKjmA9KXy+UzzSpFjoQpEv2eeXEktxe4WEsf7hUAt7aOC509
XqhxcNJxrWeSCrY1ucEnCkYGjBk9vwF8W7+F8HFcFjaZEv/FijomIfRinDMG
wHTpiFJ0hAk5mf839zbyZ/TDRh6Hw+41pwIC5RL1bVBja/Xk2qSIljtNpjYi
Qb5xirXOghPk4g3mBR1/GBeh0otGPJ8Uw9XO646lWw4x1ziNFcHcDWVMMFg4
Rjwd6ONui4tL1mFTSC6CW2aUgrlt+Hn83k4G8eJyf7AOkhog+CVzqVvBdyat
eAxO8D4fiQLjoAa2eC2MBxvDePCLYDz4DDDu3w7QfbnY3wZ+t75ZvrotUQDS
8X7E5UH/187LlrPNZmTJSHVLzJ9Iow0AxO+vA3JzQlZI2xfkV6IeZkSY398Y
8zLQDXPbkK7Wze2zkJXObXOq2mjRfv3s1q3cZ+ANwXreduZ6uLi4VWbLmNiP
ApVXJxvCMqKU3xxTQKx8LYhH6fpkvmxCErNUYDTxJ5QibX3G2k1vqOBPEJdb
vzhLQar9MEK3mXPWXYqUlLKrsT3lsiVpCeXhqEC82o5TtLdpJ3VjoxiJL+PI
vPzx1b26FbDX93kC0VqqXVCVF8yMw1dT0uU15syhD9ME/GoPz6MlDL7fqI7h
BuNLU9JdYw21C8zcTIlcUGTp1Ti1x0rjKF9HX83vmqRGb5Q+g3c+mKjxdg01
wsbgHHeauD9CECVYO481BR4bI1E6JLzojAUfJDkE2X3aSYLKujla1S42Idm1
tKqdbEKytVXX1dYONlr1QBBds6gHGy7qwdpFPfg9LerBl0VtHHsbbNdrl7d1
z/4el173cz+kg34LIbimbfSwISHUD7ZfdSC10cMGdODOsxvIwcnY1xOC+6xJ
Avji97LKJ+ipTf3Be/0m18a3XVu3qE7uuPXa+kXVPm63uBut6qZHcv3bDdf3
d3diN9a+X9/yLZTwOba5ufU+XyWFz7/PiSDW0sRGfL/+7e1o4vfD9dto4jrO
/zlo4hcoI39/mthcIGhp8Is5Br76B6OeTYSIVqX21qTkDob1YuUaUnIUeKNY
eS0pNbDRpKU6NdWjw0ISarMQaqtp4+p0fTe2n28455rBxhNICxDrrZRNGOhO
+CYASP3P3wAEuTe4CRDB2v4WkIS3va4BBzudWDX5h5dUBBxa2MRGU3ghj9A4
Us5M199daQG3CMxpX8G3LZ9sBzwhnggP+rRuhseuGmctjd1qZtrAL6O3bDyo
3XUOkxvseEeTCV8y1bgsznNcO3r8TUR1fPnPVy5YScerQ9WmWh+vJQoS3d46
muHQquaVJ9cvFrvrNtC9DgaFIg7zV107tiEq8Xe+PgR9ERFJuF/4HNukF0hL
u8PhwX7QlxLCdRBKPMH6e3y1YNQgErXWx+pVwHBOn9pmF/DGYH7BTYjGJGlL
r93Nt5juubsyuS4gtgX0T25frdkTG12qW7txNrWEe9jpHu/mUYn+FJvY95uG
Jq6eeet3o1stSq/ThfMUjvHJABOvDbJ8gE7yrXZkIcr7ps7p7rZIOnd7bl1a
NzxxF0zGz5Og0LtgVyPlNW4lBhRGxLfKv2/c329m/oqrLEYD86fHHohPITBt
Vx0/M0TXEMQqWL+EuNcStItnvP4wcIEEbVGnQnoce/3OysVN42i5/WJwC6G2
XPjc5ORwiaIaUVIctU9FsIzHfMSlYwXImy4tu4TphlI5xqWmavQ5Pvtrx/ZN
oVE8n9uJJAjl69VXmGfHgeKXeTzLKNlFeJs1ILg19PSMW9UqK6qg6lIAcfBb
wDc99jl8t8bMrz2JaMVhuYsVVEZUT4JSoHGfgZope4bXX/+svaRMcO5ui1zr
yqZ0P6XtqPIzCC9+Bl2GNH/tfdDaifyL5x5AgaQ3rPVan1wbEN/4j6893D5J
2O/Jy+PzxxwH3LnD4YYN59j3wkc00OjI1WbnwGhJWco1grGDAXcwoIYD39AX
dY+xJC9HR/OFG3ORZCPK38USCEUNDyWZUVOy8tVXOBGzZF2sYswYlHIxwLBS
2AMf+Xzw9R4lQJCyWK4jX2AeT87W0vJcIUMqimqKOkw4zNmPO+UtZm9UG5aD
lz/pSEv8Z1FK/i4uFsYZUbSCEufvbHAMqbIhdQOneCcorqXqpfJma9foKAQP
EY1bv8tiaJcqU/hKvR6594b3XVD5zv4+JYfeYIgXRz+boJRy6/zF5cvpnagB
xb+vtBJyHbyWRL6Sz5SuNM3i1IVeyte+fpFbaOI3cuwGSfJoRX2NG06D7NNV
z7IUU1bxTaWwA2Dz84yTWKWdLLWUMSjC/Sz0ewNyeIrFjZjpcyhjWyZfyvHD
WRY5WC5danDcr1gf4AhHiuaOrM6v6c6XxWr2as41ISywBJ0nRyPo7osoMy5d
QMMKX4mdXFiPBb+zryIMKB3b+NKHMLQTjoYdU+2rIqjLw5X6+GrWZvOVUt/h
pLVIXUcGvw3+MEOupjUhEV74HqeY/3BoLumCxbfdnS6x+Dewd/HfQ/Pm6dEu
ffScVEd5iOjU6AqNaKQjPiujRLTMPlVOHJe2RH/OlOqdi+GMPUFljYP2g2p+
2NUbEvafS1cUmzoBNYEfC6axl+6PUVLZ7lAhs9KGcYip3DDoGlbn4IFAw6fC
PHofz6u5qsQAivugeSuxDD53rBxmdLCvDRZJhbnqLf9N1gMGtP5MZ8OF4cM3
bn78iZQPxTBdvxSi0W9dwzy5HDhhZGWlnGl35VjiopXNw7mQZDlwOg9glcJc
ORGflUhIlM5dpbwaZUpdV7IaL3X0Gwi1L9UiqVts/xcMiOe4/4+N3faxztKM
f0/x8ubjsxmQnMVrZPTzMdgP9Hfno9mpFf34aGoP4HXjrTGadK51GtLrKlei
pgHvc38fPftXgBN+eYm/1X/a4DVmBeTgbw9wAPq1sOJFa1lfTUj1hnIt4cUM
RwiYiuplJlc3p1QA1xEFc5AdpraGUOTZGFXgdQKL41w0HW76Z5tnaIung0/P
u8KF20e1o2BNd3fMq4VcDgUu9Kye6/bDnbV1rNy9SrxjzuXkNRu7NmmW6EXN
aaiFPuhuMl0JZpELu8EbUNIXqV6+n00KxGPHXJCjPQl8rfAnWcKXIO9SIRFN
4U6J7MOwwVAIPT3b9rnihClL0B32pqnitDoWVkTXkSjVuV5t8RmQt6VNUHd0
SLipJFE44IaaTrJQECIxSpGDPbrbpUl2Af/d8ofCLMonmNuzx4WPc3+DuXGj
CNAk9eMjLmgiC0WasysPqBbexmKxhN6yXuJroFWhw+YnqoMMErLFFKC+Vi3d
3qbaEiurRjKjlACVHC8l39t318QJR9g6txHdXaKKl8qy7xZaHBonquUPtKot
3pCmDJDYI3Tx44vt1ryCfZjMRDxiitVtlzpVbya4y+44IQ7JQrgIQJgIZbvH
bTpps44G/gGiArksrnfmRUrCPoPKsDJ/rTIxJgrhx5uaL2mhj7WKQz2BeZAD
P6SYmr2iEcAqt7YYTi6yq5GoWhiyUYaPsSY1orFHGAjQOuGi0jlVUkEhnwCt
l4Rw9/7tJRzgKnhkAUsrsahJNp2arWli38ejOEEgRwAzDErHba1YDuV6Zncp
jvReHO71kgE9DM+1eCNpqWkTMA1poRuSr/fzpZzWm/3Id8+1/HKd6fLlaLxy
5O89F0KpfAXaJrjDpqVUQigxtTEngkDjx0grCHmB50G9yovcds6n44f7Ow9G
sStKuO5Gdq2YUcH30WXvO3mF8lr4JNcjta3BnxiSHFQq9HUdghq1yPKwL6Bo
X7jwiStcyFeuTs7DNyC97XBaRTjV2gfAHv0YW7s9TCFC/BPvIUZcATtMAZqQ
z1q4+vn5DzLU/t79PbzF/ub5uQ6+v3+AT+TK4b+9PX0mb77e2dnRMupbe/UR
OV96o6yMx71eEHsmVkrerA3DEF9B2wLh50VP8w7cQxzJZH1mRtFRM19HSIwX
yJLw8l08pozrinC+wOaw7JIuR41Ks0U1kgzsVBnyMooTkn/W9OOKN7ldWWi5
9ZL3Ak8/59QFkUkrVaGJztIMJ1S719+4S8hJJDh5/xVsKYRmewyHAf+GG4Z+
06yuXZ4MrDsoQX1fJFa0IxgqqpIS07rjdUvtMYQGAcVDBjOMELEXeAuQhBGe
/WWVpDDbUSLXXeeewQRlKDCN9k/oDqLDx6NHCBDTog4Y1p6Wf8XSz8GXzLwK
Bg57Yfj05izWt+Iix6UmHl6p34RiGxEp1mi4iDQXudhIs9QB7oeVetW+IhuQ
BOYdkkTBDk/YD3UdUJtiiqJVthVPyJVjX+n+er9928PDQHcjH3OQuxUWseW4
lSCdoXmbam1ntIzmsS8ETNjVsjHUKyKL/SfQUV5NZIvQDWXNAcSxP2g2o3ew
2y7s6n0U8YhSznVNYiMlZlBUxcvdWVUkS110ykAbF2VYtl5KTHGHEvejubbV
sjrO4aigLD1lCcfucAXDm7hWb8K4rH+I9Ib40ZbHBRHU6hPlCZFj9ObV8fQm
wUXN1eHegiVqCCxupfhaueueU3ITPnFxRgKWu3wu1XGwsshqi5H1H6o76jyb
+xInIPs0uUobb1vJ+sNdhfzmFszmVGrvVULTnDxDUjypTRtB0ykFt4ou0PgJ
/xGO1Dd64TksO9WrcySe2KplMeAdMp92BnID9+C2N/KQtRTOVL3iwLyesjdx
XNbclVjokSGtQloO0azV13D7UzUd76PlbcuKkCvaE+74lhH7fCqVJVUvbO5/
EjDFxE0nNf06UA9HoXJpW+GboFB2vfpiSwWeMgLGVxaNBGWc/ouzHUhZNOxe
yhKxGk8FAGsF1cRKxhVXpPQD+QhICUSzY5UKCfJZytI/sE+W8ch6fXoGf+CG
eeMEPg5SdKL4Fkh4PTbhkfB5sMveFUAY5Ve4WVR3s+d8ClyhJjwq374+LVx2
Isre8O8vnmP1G8q+0BWs3jt4+JBGJh+h2qWg7aHZNJ+PayV94y5/xhlo2OZ7
enL+va/uC1AcmpfbR31hT2R0A7zBmFLKBOF0eYWG4r3ceN4BU/PzDxM+Yd57
DslzqSikdvnO3s4qLhCSQ1P/aZ0+ZwGqf1qFH7g5Bd/cGslBkTukNCCWJ+al
e+scVcEQmmFC3cD1TdlEKi1HwVSIMjnl4OCyWqu+TrItO30e29TQ2n1NzuPA
VooGc4yf+iC8gP4mQ+VHtowjwB9rJQjcz0dvc6fs/hr5SO+gPXpD1llUP6qB
nvrBOQ80P0pgaQXA1dLaNLijmbUzGAyoagfuU6kEUMB4oAQSWlWdUmtcUIf8
beEyNAWFAj/caVTfFWdOyaYk4gC4IcL0T3z4X9HZz+anTBTR8KzgkkckXrt6
RFzAKhdjRyFsK7tKrQ+43sKKSj02nmB3eLYTk/TKo4wgNkLmtqRPNRxXf8BC
TCjmAEeYotGQ6MRVbcIAaQWtL0YjFiRrtZqkkrrCZ6kGKUkcmDmWunx4uLMD
/49Nd/X3t2+e9Tn9NqVVTM2forTC9D+7BRxaezt7ByqfHqNcdVsQQUUkl69U
wxG5PRuL5Unlc61Pc/zMyUkOJliLh4f3CFgYR8Hb2xEhG0F09uVsOhVFeLCD
M2Q4YY5m6yxii+w5GvuifGLexHOxDXONL+4ORnO4AfhaW6EKdmzH7Fe+txui
iWJLpTYGliNJ+Vi27wcNAv7ka85ZLTwV2hhQl2+rcuqrWnOsnNsjh8KNv63/
oOPi5NDc/c+7BoNCQF4XyzpqoZQE7sHXe6bR6NtO59ETYLCaL+jb7u5wp4tm
wwwx9W23An77sPvkcecRinMGPk2Lb2/Oa7cuZyP8UBeHeAps0I8awzj12KOG
Mhr2eOvOVrp77I6MRxqd+Pj1v8AKf3P8aNs9aX6E/P6xv7OgX9JjHWe7faDN
x6fN93cDor61bwIjvD6xOSDNp4U8hvWS31BUeFzQhhu4+NlH2/SYv2AsrMbX
Ptr24z9CJcSBAn8Ek6CuUKTfDbulV6KL+ycriAve/HKKlJ4b0bwNKmi+rbdt
C771ZNz6NpzUGirBNys4eMSVo+pY8f6DxxF5uh9tB4+C7lYaP2oJZ90Ukf9Z
Q8Ktf3Qdgl6YTSkgG4DgAoNr6PBxio11apbMeNyYwSNfKeMxnjqDnV34/zc7
cmT9GejAf9Bsqwn2H5+92d3hBrD2+rAOyPb1kDxyxR0eOx19EsXJEtbVvam3
oNT4KzBJ0vXH8wzOV2itfzegaWl8Q4cliOeft8crO0k/d5/lrMo/c5fTPL5V
h+FShztxdd95Xh1wyHXccu+fjVs2z7vVj34lu6Gf35Dx5hRS9A/AeNtW9BFH
sDcWKqzD4vjh3g7yQ9IYWAt4tF37rrULwDN3sLs3uLf7RnWARgf4VW15mlBt
uG3oV8I1/gayDP0DDzq+dMSKzqA1JE58dUMM+6j5JrufVhTsiKIRAr16EOrV
8M4r1HXXdqCfBDUV2SzNnkfpm5US7KBFL/F6kQ+KkMCFovktuws4YmLlHjV2
0xIRgaXVrySxMwU7Y9xq6FCD56OM41Kwi+atJQ39aI3GkMq6RynFrFIEkKYV
5an76NhoZTIxuTCyEUUMtng5NH7UrsDEtWGSpZ+vxGdQkJNYQzF6oJiD4ju4
fJ9EyoM4NETNv0dYYF1DP1nvUxtus54rZaw9Cyu4EsYXuVVHLzoqxxL4je4H
6aHhO2dtV8mKfOBcl5OvNz1v6LlS3RiDjXSu9VAjCafhYo1kpxFCjIswH7ML
PdLXElqnhvGm+r2irntnj24AifHCWKdUQyjs+1kEu4Lqqp+mgR+kb7TEEvZb
Q+RWNzwqKBeCGDm6iNPm2wP3tkfmIokgmHCddIwUwKBbqfiaV7wl/WbF4Wfi
qWiueXTtcnPURRAUFHFKBRqDfCnDv4uN4XdgZPisJoY1uvUG5oVN9fo1yvSG
464xK/yawVv1+DVaPCILN8kaJb417+AXXf6LLn/9zxdd/osu/0WX//9Nl1/P
7OAdniHXsNZQUIP9eW+4M9zdvTfc3d7br3PZX86ZakPUwK7D9kXZ9w//aZV9
UZlatHxUNFe0fGNqmhZpDljBjXStQF+XQCYQrrSunhlVpd43D7VeSm3GsRlf
BP0vgv7fStA/uEnQP/gi6H8R9Df++SLofxH0vwj6XwT94N3Ngv5BIOjv7B5O
Rg8Pd/fu7R8ebh+AsH87jrS26y8Cvp/I/8cCPhcF2kDKN1v4Za/FpUe3l9mj
d8QG/KDwmjj1Iu/Us96lIRdSmxrCeMVf6Fx63kng43GHq08bVy9cLUy6/YT9
jCS9rL/wjsO4zBroaWlcxtZ7SXTbmG58Yz98/QVON3sVJUnNzYVzkjBUl+Lm
X47xtgMQCkUwyw1YveJO+xI7uILuEnijLje87JKCZpEvMvSpmCRalNliqOhs
XIiPiiIbxy6QM8hKAjNljyd5pgQ2xgYWTw8Kq1MjRSmmbeHL1ljOvrQLs4u/
7bMrC0uKX8b26nfh5IvqTr4o5XTZKyRzrdsP29/g+dvQ7SezucHz9w8ZKHuN
JhWtdZnUMq//RsrTbexou1/vDXcPHg73/iZ2NC9RtAKxK0C0ffN5D+sv6tMX
9ck//aI+/QOpT/ry86tRv1//w++Gb35Rcv5OSg6/+lWqTrS5LyOUJv8ZHBl/
C2GvxWxeK6Pz2wl7B7e2pRzukh3lszGtVptKjWm1AbEnYIRf/UppaR3XO/hV
XO+LtPhFWvRPv0iL/0DS4m8iJd6e4f6mxut/Hkb7Rbz8vdnQ+fmqeNkiXN7C
jo4CIdvRzZFLk04JGaBPTm5nJ992p1FS2G5wFYYSEcyiwoxsCtJkGd5SkMQ7
lIgHb+K4QAk2xWMfLonNGYur2aUkiFxiYvuhad4gkEsdy6waxHtpMR1UjU7d
7Q7sHW252iL+6wwaRWk8jwAtgzJrCpUcjOGzX0/M3GKW1biYa0Iu2PnRCIRP
lKabdmRKWuKz5LJsjdOWMgupOgCwI/UBqNVZMtf+KY7S/46t+Tmr+ubFMjN/
jvJ02TfPZjkmUYsw9cQYz0XMavUimwFrnJinWTWO4NjMXWLHn2mu5nnM41DO
EXIpoKoQ5QnW8BIBHQHcHKecDtc2MoZg9YJ3nDCEEkVJZqiohMUrqU7k4Jjy
OWFq2mwCT1wGi1WMBDifUk45SrGWSLrEgozamlAx5RtNI0wa2ExVSvQJcNEF
oz9l1jwD+nln++YpZqr6zqYpZop9atPs//7vEl/GBbx8nY3MT3FSYurc4wio
gNKf5cXghyiHJSDvylESYW6Ld9m7vvnBxu/exeZH2ESYRgda/QSk8O+wUhf4
a2x+ot9+yNKLK/jrecx5z/9k0wK++zPm8NXLUoC/GJMBo9tCUk3OOQNaYzLH
s7y6hP9mE1+V8NXZ+fHpa2k97Pw/bH8Ajm71AAA=

-->

</rfc>
